Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 11:39

General

  • Target

    6811b7794c540037d3e13e638977c4b119331382d3717707b582983cb641f6fbN.exe

  • Size

    53KB

  • MD5

    4a5d00c8f0838e9045a20887968fd6f0

  • SHA1

    ff4d2042df31b4779ab7a632a58299cb630260b3

  • SHA256

    6811b7794c540037d3e13e638977c4b119331382d3717707b582983cb641f6fb

  • SHA512

    10fb98fa3a8c4d2c1200aa2332010b27069099de1256eb74925eb2571b6625a858cf5717502fbcf6ac2803558a3e540e92f950100f10e70e91afc2a018ff3c92

  • SSDEEP

    768:W7Blp2sspARFbhVgNNHpQRNHpQRxRYstRYsI+Pe6:W7Z2sspApctpQRtpQRxRYstRYsbe6

Score
9/10

Malware Config

Signatures

  • Renames multiple (3257) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6811b7794c540037d3e13e638977c4b119331382d3717707b582983cb641f6fbN.exe
    "C:\Users\Admin\AppData\Local\Temp\6811b7794c540037d3e13e638977c4b119331382d3717707b582983cb641f6fbN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1846800975-3917212583-2893086201-1000\desktop.ini.tmp

    Filesize

    53KB

    MD5

    34b898ee47d0a823aa13cacc41806ea4

    SHA1

    b14ecabebede1d5468b3accec347479bd05ca6e6

    SHA256

    63fa0f2fb3c4db6009366623d2d69608da084639cec86c3361c504899ffc6a85

    SHA512

    59c80128aa7c8d4bc5582ddfff4a889354f021169b5b2781bff186abf8a8924697a241a43dc5a48ee17f3db0ddcd5001a8abe9600d8d468daf1769d943e985be

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    62KB

    MD5

    4e0e10e326e2fb77c219737e50f08314

    SHA1

    7fbc3db7000e72ed3e8f43186ec8b020a4db0255

    SHA256

    80b7e7494cbb221656214bae63665c3e7a2f3fbf2501dfc3bca91e0704ccfe97

    SHA512

    1567090f8d7743c40a83d3523e6471c007f9782e84eabdfbb6d3e0f58167fff5269330b1e593c56f7892ab1d2ef172799319cdcb7988a5b141b1d490741cd731