Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-09-2024 18:21

General

  • Target

    809880aa6edd40be77a8ae611909ccff2863b87150a4cdaecc090b8d458151f4N.exe

  • Size

    41KB

  • MD5

    016db14147446d1af9af987b91a47aa0

  • SHA1

    528fed616d381c4d5ebe3168a384501d1932a14b

  • SHA256

    809880aa6edd40be77a8ae611909ccff2863b87150a4cdaecc090b8d458151f4

  • SHA512

    ec0be84865eb1cddf3e97665f822cbd6dfb3f7a9a3b0f3893090e4c3a4f4a9ee00d5539c547bfcc50091a1801a9d9e1a8d9c23224ce07cb40c845c1ba7cfa092

  • SSDEEP

    384:GBt7Br5xjL7lAgA71Fbhvt3avjZjTc7QUlac7QUl92ns:W7Blp9pARFbhSjs2ns

Score
9/10

Malware Config

Signatures

  • Renames multiple (3149) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\809880aa6edd40be77a8ae611909ccff2863b87150a4cdaecc090b8d458151f4N.exe
    "C:\Users\Admin\AppData\Local\Temp\809880aa6edd40be77a8ae611909ccff2863b87150a4cdaecc090b8d458151f4N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-312935884-697965778-3955649944-1000\desktop.ini.tmp

    Filesize

    41KB

    MD5

    c69ebb7693b2a5e18f7719de87c0f000

    SHA1

    04d5cfec804dbcc9de6b6e00b9e263019b60e080

    SHA256

    6e1de33584dfa434fe7386fc75596fa67ecf269e87452ea1d9dc16f2a7fe4007

    SHA512

    301f8618faac5eeae2962d7029e2f538289ed988b6629e1760a601e6fbdcced9f3f85959679f5dc26c9a7c847069e1044e292b34820c09cc3c3652244ef163a9

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    50KB

    MD5

    a4aeaa400f16a4c96e5a2416e6508088

    SHA1

    3cece39c5b794b9f06ad00e5b245819af86eace5

    SHA256

    c736a9ca202c0d9e0a20c3f899ad3158a967f44ed75f5d7e3366c6425e43b0d7

    SHA512

    3def088976d341c9536443f85d933c3b0f7ec7b6c2960f84bde783801869e66f86baef47c6d5c34999663adcc308f9829b271969cb985778154e26c0bf218c88