Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28-09-2024 07:13

General

  • Target

    3b63ab95448e35e1fc82ac4b8eb23233771003f3a705eea96f4955328d4eb8a9N.exe

  • Size

    37KB

  • MD5

    6bd5be2d2cd72ab13a0b0faee8e28290

  • SHA1

    512e332ef21065bf41d11ea9d7a6e340c95ff59a

  • SHA256

    3b63ab95448e35e1fc82ac4b8eb23233771003f3a705eea96f4955328d4eb8a9

  • SHA512

    0319fe096475f88edb3f64d21fcf6595d55c651f29ef33da9ec4b703aa2042fb8d1022748ecaa9714d155192ce948627c51e7ddcb18a2d698b54af23d4eb1b17

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LOl6Sl5ltE1k:W7ZhA7pApM21LOA1LOl6A5

Score
9/10

Malware Config

Signatures

  • Renames multiple (3418) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b63ab95448e35e1fc82ac4b8eb23233771003f3a705eea96f4955328d4eb8a9N.exe
    "C:\Users\Admin\AppData\Local\Temp\3b63ab95448e35e1fc82ac4b8eb23233771003f3a705eea96f4955328d4eb8a9N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini.tmp

    Filesize

    37KB

    MD5

    80ccbe6831cfbf22a0f099b5ec7ba6d8

    SHA1

    9b9d41f4c4d250469969010c6109c3e325902fea

    SHA256

    c695c43c933e09a94cd1855388cc12bbd864dc1cfd7d2b2d427aaab1d99a740b

    SHA512

    791711270fda6089b703042d984ffb26273edfe074e71532a7dd9c44a8c13db7c748e74a2820d03b1bbbb06eb8e4269ee662479e6e29668b3f08b9a7ff7e397a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    46KB

    MD5

    99ec6b974c023c3795a1627126bb9860

    SHA1

    4845aad710ad89a8bb402112f1c13bbfd3005967

    SHA256

    eb6f4d5057cb644d73969c4b2fa565e04cde912f4ab7f417980a8445e515dd57

    SHA512

    f2c13a6b71c28ffe3f865559bc6b2c681c73f5d788a4a528e6f13f5ddaa9ad1d733a20b9eae01ef3a62c4f268e310259bb60f1739471b8aacf21587fa1f8d3d9