Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 15:38

General

  • Target

    a61447199a6f49f33fb24ab2534bba0c299ae5b625476b277543d27e554772f9N.exe

  • Size

    49KB

  • MD5

    dcbd6a4b43e3e8b9be7055b413e91550

  • SHA1

    9734857178585d23385ecc0f54b095eea61c11b0

  • SHA256

    a61447199a6f49f33fb24ab2534bba0c299ae5b625476b277543d27e554772f9

  • SHA512

    efd1affaff89b0553cdcfb3cafd134a7a670fc21663b5932d23c962fa2bdd377e4ccfee2fe48ef7e13320e30a8591251e17a1bdbb22340b0d80b62f900a8fb7a

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfproFNFjqAJLOqAJLBbfCDTbfCDNXM:W7ZppApBULcfpHLcfpyDkbfGTbfGNXM

Score
9/10

Malware Config

Signatures

  • Renames multiple (3255) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a61447199a6f49f33fb24ab2534bba0c299ae5b625476b277543d27e554772f9N.exe
    "C:\Users\Admin\AppData\Local\Temp\a61447199a6f49f33fb24ab2534bba0c299ae5b625476b277543d27e554772f9N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2060

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-312935884-697965778-3955649944-1000\desktop.ini.tmp

          Filesize

          49KB

          MD5

          2996b8a66e8db6f95610c93c0150d429

          SHA1

          76451370336b36a0f01c62643263445b2f060016

          SHA256

          387490058f1f98271ba67055deb309744bba0daff1417874e593ff0de6992c14

          SHA512

          b545de3161fe4ba9f28293eed2ad9882a524cdbdb9104d4641c2b0968acdf48e5158da5d2c5acdc9afe53b510e80d8b93bee1bc3be542944959b4d410fd848a2

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          58KB

          MD5

          1c19a54d7ad6db6903e13e4596d6f655

          SHA1

          9dac3a2c3eb192fc6d2dbc924d5587d8f4615ad1

          SHA256

          c10a6cd465815f5d6358b4f76f84a645a5fca130c614795ca036c69ac3f8dbd4

          SHA512

          51a3d73ab019f000f046d58196379733de74b6fa3c3a828848f736c406d6991dc918f56ea8cb545a02f6a7d759e22766fcfad964b731174b924e1a247562c060