Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    28/09/2024, 15:52

General

  • Target

    914b24fcb26e063aa11450e4752f3da78ce7d6819048df950d5e380f53431352N.exe

  • Size

    38KB

  • MD5

    59387bc83c4defe2bdd3a522db046cd0

  • SHA1

    1917a320e834100b5fbc312e572437919c777ec2

  • SHA256

    914b24fcb26e063aa11450e4752f3da78ce7d6819048df950d5e380f53431352

  • SHA512

    d9c4546de63c11062e675645cf0ab31168d6a399ee300de11ad52cb51cec7957488701c31bb9d1655e97d8912468a2c30cc4c56bca1bc883e6b9d06760a83989

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LOl6Sl5lt4ou7Oi1J/x+Oi6JAfou7Oi1J/x+L:W7ZhA7pApM21LOA1LOl6AWD2DA

Score
9/10

Malware Config

Signatures

  • Renames multiple (3340) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\914b24fcb26e063aa11450e4752f3da78ce7d6819048df950d5e380f53431352N.exe
    "C:\Users\Admin\AppData\Local\Temp\914b24fcb26e063aa11450e4752f3da78ce7d6819048df950d5e380f53431352N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    38KB

    MD5

    0080a145e8dba7dd22ec2ef153cedf8b

    SHA1

    4e1879b40df185f1f34c5b1c388a4aa3b4e3ae3e

    SHA256

    49c135aa398ce773a55928e365812ab3ceef572d61ba7255de177126db64f0c2

    SHA512

    a8514012374523bff4a949ff50868113be19b2931fd64bcc7ecca9c295d39f39ccdfeb9a3e6eea083d49f47b24435aaffc1a64c9effd6aacac1a6713e6252397

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    47KB

    MD5

    b3954d236a9a7d78361b5906eea51404

    SHA1

    ce612f731ba534427bcb84ca97d58d100f56102f

    SHA256

    1adff5a45f31b205e1f26516f6e2c659e92b028b54d1aca361635aae30f2e3b4

    SHA512

    b463e572fdff110ac077a0b89811a8828fda148e55c8502fd2b332848380776d6f18d99a827470eca659070239e61fd0c2c301c1516919bb7a3e952d12961a6c