Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-09-2024 21:55

General

  • Target

    1ab54aeba986ecdcc7d4fe57d5ab88fcf31a193e1775107d5bd717a83468fe2cN.exe

  • Size

    76KB

  • MD5

    a2c8f80ac551143d3df29a3a33ef90b0

  • SHA1

    fc7fd6102b0b8d7ef1c069541fb3b75d0068ec61

  • SHA256

    1ab54aeba986ecdcc7d4fe57d5ab88fcf31a193e1775107d5bd717a83468fe2c

  • SHA512

    0b915d2c287cf519a865b0a0508763a0fc5c49163567536d7773dda2c0b5b2282d91bff4798bf6a75270fd9ab10c05cc01a16ac63a10c6bdf4ec0707c47d06fe

  • SSDEEP

    1536:W7ZhA7dAZ1++PJHJXA/OsIZfzc3/Q8+CtlYSDP:6e76mQSostXDP

Score
9/10

Malware Config

Signatures

  • Renames multiple (3217) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ab54aeba986ecdcc7d4fe57d5ab88fcf31a193e1775107d5bd717a83468fe2cN.exe
    "C:\Users\Admin\AppData\Local\Temp\1ab54aeba986ecdcc7d4fe57d5ab88fcf31a193e1775107d5bd717a83468fe2cN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3290804112-2823094203-3137964600-1000\desktop.ini.tmp

    Filesize

    76KB

    MD5

    5cb2d4c9142ecde6513f0f74b7511190

    SHA1

    3fdd8f2b8eff4d25f1ee3d4419653583c237cc26

    SHA256

    88e93be1525dd7e7a8528715ea18921796c59affc445eb5d5402596f88326ade

    SHA512

    8029ce5e53f53f103b188e6481abe6db83b395cd44ade20b29fa0bb66195d6c88b5610bdfc5f6a1fa53a3fcdfa7deeba5ff4b1f1305f4699e36ea6d49a5ac661

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    85KB

    MD5

    470a66c3cd5411772998b4cbad801d28

    SHA1

    89343da51db1694d7f84f6975e8acbdb7e03c423

    SHA256

    17f08cdeeef906058320cec8518f2059b3abb9e2fcfdfd5542e8c3d541ea59aa

    SHA512

    0224af8ce78b25f8c23cf99e9b48ecab8b2ea2163b800cd551d135cf31e2b7f5f0ddfcb73d3cf3319137c5ab55d47a23d71bf79c872762582a522bee00755997