Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    25/09/2024, 09:24

General

  • Target

    538363bb4651942f7fe0da058e6301b3f54c7e405d7a47a6d2f2988e5b742b23N.exe

  • Size

    48KB

  • MD5

    61d8c2ff44ec9b9bbb2f3ab337e65070

  • SHA1

    36c9df61711dbd3d651bd12c637fcce56d90c369

  • SHA256

    538363bb4651942f7fe0da058e6301b3f54c7e405d7a47a6d2f2988e5b742b23

  • SHA512

    cb0b904b270c30bd32bf4820ad6ac7cbb272192462e8e0c8dcddc5bfdb8f818286088da9c848b2a9237d17ab018989db76a12ab4c01ec748bbce1f0c5bb8a7d1

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42Lcfpb2N231F1ngig2/Gum/Gu/:W7ZppApBULcfpHLcfpSo3f2xf

Score
9/10

Malware Config

Signatures

  • Renames multiple (3781) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\538363bb4651942f7fe0da058e6301b3f54c7e405d7a47a6d2f2988e5b742b23N.exe
    "C:\Users\Admin\AppData\Local\Temp\538363bb4651942f7fe0da058e6301b3f54c7e405d7a47a6d2f2988e5b742b23N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2084

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    48KB

    MD5

    832bf50d21a626e3d96974726b3bff46

    SHA1

    b279b0b71919d94f38182539422e9cbb98012f29

    SHA256

    fd545994e7dad7823f2fe7f9f18336118c39e5ab6fb7e9a5fc42b0c484a4ef41

    SHA512

    5c81cbd252e3a42717c5284ad27abc44776adf2542cf6d157cb56abe2376387e70f1aebb7322e13bb41f798a24a582455d0fb2cec5c4e582e6068d743e5260c3

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    57KB

    MD5

    7cfe90008cad7bc863d708b805257d0a

    SHA1

    b6677741b69a1f4f27cbe4cebce47f505bb53ae4

    SHA256

    b3420923ce980abecec957223876d9293a82cfb3df45f5fa29ec1d417986ddd7

    SHA512

    a985ff6b5853f57f57bf3409584fc58e5ab7265679ca2490cba2e6b232e4efa35dfe1ca12e8b36a8e2966136c6fa0c4a3d3cb957ef9e28a86cf68286ce473b6f