Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2024 10:29

General

  • Target

    f91932f8d4d5f2c882bb0de0284cce9878882551c6b93be4fd4797d4e24e5c16N.exe

  • Size

    55KB

  • MD5

    cae22884b53214d7645e8c0055d154a0

  • SHA1

    ff3e039e09d47f9fbe395f79f370db2631544c01

  • SHA256

    f91932f8d4d5f2c882bb0de0284cce9878882551c6b93be4fd4797d4e24e5c16

  • SHA512

    e8f51c315061db639ffc0f59d6f330c11f856eb1ba5642cd87530431336ec6edb09e60a567171cfe089a7af272247c55b41cd4f7eab919ee41100c35b2ccdee8

  • SSDEEP

    768:/7BlpQpARFbhNIiJwsJwwnZap9QKQZQIQ+:/7ZQpAplJwsJwwnEp9QKQZpx

Score
9/10

Malware Config

Signatures

  • Renames multiple (3158) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f91932f8d4d5f2c882bb0de0284cce9878882551c6b93be4fd4797d4e24e5c16N.exe
    "C:\Users\Admin\AppData\Local\Temp\f91932f8d4d5f2c882bb0de0284cce9878882551c6b93be4fd4797d4e24e5c16N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-312935884-697965778-3955649944-1000\desktop.ini.tmp

    Filesize

    55KB

    MD5

    c956af16a3925f92128a57bdfdf02f5d

    SHA1

    2cdef70e3db581e6ff15600871a49da0d15a111e

    SHA256

    ce833bf3fa5a5be78b0a0fc9ea115c6e373a3e40f3a0106bfacbe8964c6a1d98

    SHA512

    4a9a3bc656998312e7fdfcdbbddaa0f7c1a7a2949bc449933e2d9bd1b490f4c84c82072edb262e636a4eac253fdc526348901f778859bfaf2ae1c80325eb5078

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    64KB

    MD5

    595d36554b39ed1d88ea447cd723b77f

    SHA1

    8319e2b5fc4e0fb58138d38b527adebc906cabca

    SHA256

    64477e5d0073af32c348c7a36d31f688b27c11d60551976a60c175c42be2afc7

    SHA512

    bc88411c43376706b89d442f7bf2aef5bfc73c221da53a12139603da85e7f1dbb83804159b9497382e0c79b3fd9cf31e0a25a8856f66d88e11e8a33261c3fdb7

  • memory/2680-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2680-68-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB