Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    30-09-2024 16:26

General

  • Target

    f7299ccad2bcc34f2e8e805f9239810c562d3197cc075d72d9833cac6fb18f98N.exe

  • Size

    92KB

  • MD5

    c84f7fbe7b9b6cf6758ef797ec8dee70

  • SHA1

    5a0a208ce0c2859c0810d90ec6996ab76daaf8af

  • SHA256

    f7299ccad2bcc34f2e8e805f9239810c562d3197cc075d72d9833cac6fb18f98

  • SHA512

    63bfabf44171144fc8bbf356742cae9d70ef1912e03455a35e1410bdcf59070a14c950af61e8c4a931451b8f833a1c7441e70679afc642bb6f0e46d237c62194

  • SSDEEP

    1536:W7ZhA7pApMaxB4b0CYJ97lEVqNR7Yge+eTdsdTJilJiqTpTh1T:6e7WpMaxeb0CYJ97lEYNR73e+enx/

Score
9/10

Malware Config

Signatures

  • Renames multiple (2986) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7299ccad2bcc34f2e8e805f9239810c562d3197cc075d72d9833cac6fb18f98N.exe
    "C:\Users\Admin\AppData\Local\Temp\f7299ccad2bcc34f2e8e805f9239810c562d3197cc075d72d9833cac6fb18f98N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2252

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    92KB

    MD5

    ee63410bcdb497cbb42834913e707bbd

    SHA1

    8d32b6adf6af3bfa4bd8013fdd46db13024fb762

    SHA256

    0074b7c623aed08bd2b72a1cfbb0382185a90d83ca369c783d5f3fbb54ffda21

    SHA512

    b5e8fc70acd81497845549dcba6f344c16c31b1c49427bd1fa8214656cf2158016ef16f918f54a077d7293ee5861788c39062dad2aecf06b5fd30f6c5d83534d

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    101KB

    MD5

    127398faf92511f5267db95b90c03109

    SHA1

    c6352546608282c28ea7739aa83b2baa14772014

    SHA256

    b3389bf536a028352ddae000af86f989d8e955af677e762f729b26970d450667

    SHA512

    a5f44afbe5927e5c09c4a663f601551498b8944022d2b4d0fca1af28b55dfb9f6008a9b2ae2440216dc4ac417ccae16894f9c6f0d60cbeb01b1109f7fd913eec