Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 11:49

General

  • Target

    21a199dadb3813ba15fb3dfb064069c80d331b8866e0f7eb42f6cfcdf6429caeN.exe

  • Size

    95KB

  • MD5

    ccb91f537b4bb0446853fa20a3bf0ae0

  • SHA1

    f9b7dac2e150dab2e34401ef24f5f5ed288e1415

  • SHA256

    21a199dadb3813ba15fb3dfb064069c80d331b8866e0f7eb42f6cfcdf6429cae

  • SHA512

    e5fc8e98d3436ff650105311c1e82848d10bfc05f9e4f713e2853acdcd78e286b16c3f5d12defaeed12cfe2905b1d0be02e528b1640fc28e66bb63fce7e7cb45

  • SSDEEP

    1536:W7ZhA7pApH9QHwtRF9ESWu0SWujodsodaNovTW+SPL+cycWAF689ilxMo:6e7WpHIyRF9ESWu0SWujKsKRsP9fVL9O

Score
9/10

Malware Config

Signatures

  • Renames multiple (2920) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\21a199dadb3813ba15fb3dfb064069c80d331b8866e0f7eb42f6cfcdf6429caeN.exe
    "C:\Users\Admin\AppData\Local\Temp\21a199dadb3813ba15fb3dfb064069c80d331b8866e0f7eb42f6cfcdf6429caeN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1312

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

          Filesize

          96KB

          MD5

          5125b5fdbc0cbb1f8dfaa384be8c6727

          SHA1

          1805fda693697a86976d2b19e11732d5ef42fc64

          SHA256

          d28ece4165337ae26533019c63af4a29f2126a435aa045199370461374f35f44

          SHA512

          cfe400ed7cd507e8077016da5ad29b070ae71c708d256b1983227ac9f28ca7a3c09a11daee5e1ecba3d015aacc24adb23e23a6ee136b069918091ff8996b8391

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          104KB

          MD5

          718998727e5f42add7afa430308b0ccd

          SHA1

          91a6d106f6d3338ef233914b593348dbf32b4379

          SHA256

          c514e8b0951fd53dabfa80cc8ceeef350ca66665cd7872874001e55d29bc0564

          SHA512

          01d22c8ff2015a2158b240dc4053641ee5027fc46c830d048f9d01f0173d9e266424417f19fc78f27e959436244f762fb71688386d538d0210630b6291ad3234