Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25/09/2024, 06:31

General

  • Target

    be5456a7b58e293c197bd4f0765f02d03f51f1706d9ab8b0a400c2be60229a96N.exe

  • Size

    52KB

  • MD5

    3b1fab5a8a11bcb2e83477110d069380

  • SHA1

    776ee1b4b5516669a7c620e9430af44a14be0489

  • SHA256

    be5456a7b58e293c197bd4f0765f02d03f51f1706d9ab8b0a400c2be60229a96

  • SHA512

    d595a841fd7f9b8d09326adc06b8bdfda33c5a466c3b17100e1583df592cf32f3654580e4a2450e55ac5519f3fc5d737fa3a94e56efef928ad77080ccf371735

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LOl6Sl5lz/g6sHzcXHzcC3OTHTQZ0Zo:W7ZhA7pApM21LOA1LOl6l6YzqzV3h

Score
9/10

Malware Config

Signatures

  • Renames multiple (3218) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\be5456a7b58e293c197bd4f0765f02d03f51f1706d9ab8b0a400c2be60229a96N.exe
    "C:\Users\Admin\AppData\Local\Temp\be5456a7b58e293c197bd4f0765f02d03f51f1706d9ab8b0a400c2be60229a96N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-312935884-697965778-3955649944-1000\desktop.ini.tmp

    Filesize

    52KB

    MD5

    ff51158685864e99f0060bf903b447e5

    SHA1

    57e34f26c4d89400ccab9711c5bddd3e56fdb31b

    SHA256

    5d4fc5700ede26b151a3690a15ef3f9ada1a0db5e2cfbae9d942e00215112ddc

    SHA512

    a42b4d93ba5abe60db1fab109fcc14914d728b34480d9c62868af53c93df8afe6053a64789fa8adfd58fb0a49d019fd7b4b19aa231073d82bc17c14131910cdf

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    61KB

    MD5

    3466b6189833e75ea4da353d645a0578

    SHA1

    3e9594b7d5f45f10798a9853e1766686ce5b0cc0

    SHA256

    7a2467b3056858340ecfadcd260d6a8edbb7d211e3accdac722d29cc3e4c9b46

    SHA512

    9ffbdd093bc428ce9dba5b3051a2677bb334291be057556ef9171e8e2ac54bc5f28923dba02e7dc01571402fb797fb538c10c26b0dc64e8fdc18c6cd61315020