Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    30-09-2024 02:34

General

  • Target

    21bc6223990fd4de22b51680eb6ee8498d4565be47cf13f7d8c697743a94b71aN.exe

  • Size

    54KB

  • MD5

    a307d72e6af2d9db4e8499577ace4420

  • SHA1

    98b17d567b02b95e53a5f997d2a7860ccb0f1146

  • SHA256

    21bc6223990fd4de22b51680eb6ee8498d4565be47cf13f7d8c697743a94b71a

  • SHA512

    1d162d567fe02154fe7da14aef974090ab689de2209edc6c71bd91e6f326cee31fd8622dedf9fc75cbfe682bf9c74e74d1ff55e8386c62f25e79b943964eb3ae

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfpW/fSwN1J3DCl4N1J3DClEutB:W7ZppApBULcfpHLcfpAS5tB

Score
9/10

Malware Config

Signatures

  • Renames multiple (3126) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\21bc6223990fd4de22b51680eb6ee8498d4565be47cf13f7d8c697743a94b71aN.exe
    "C:\Users\Admin\AppData\Local\Temp\21bc6223990fd4de22b51680eb6ee8498d4565be47cf13f7d8c697743a94b71aN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2292

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    54KB

    MD5

    6e4d180667748f7b276ed27643c8438f

    SHA1

    09e841974375935edad0975121ab503f70304179

    SHA256

    6ce7cca7c35b0d6fe0fb8bd818a33deff226fa2e334c660dbb4795a8373729e9

    SHA512

    6115e77a082b29f99e8a4a57e401e9e56ce956d6ba0127c4e9c80d1400a0ff05f7f290fddf63d74ccecb2be75cfae8c53d4509fc9ba4d715be62bb0d0ac86dde

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    63KB

    MD5

    e011995f9d175dc68341430ee2cd39b2

    SHA1

    b284929167b60be106b5e53329fc884249730654

    SHA256

    087817de127e437a88fe2b086b6a6e45badab69848ce896ff7c6707c61529c58

    SHA512

    689428dd3049118107757f90ef0fb6c0f377c3fa96dae99dc4a7d6162b8a8fb91cbdd0f64286425ba2d2199575191dd1194b19bacc5f16ff486885d103634a71