Analysis

  • max time kernel
    119s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30/09/2024, 20:19

General

  • Target

    2fb61b4c8541afd1fb411590a63b9e828b1a278a3a9b5046a91a913b44f86c32N.exe

  • Size

    61KB

  • MD5

    f3e7fb285b3d0c7b0d8e03e71f099e40

  • SHA1

    c6cb12d5f54acfe41fe9e5188828a650a4302f11

  • SHA256

    2fb61b4c8541afd1fb411590a63b9e828b1a278a3a9b5046a91a913b44f86c32

  • SHA512

    9ddeb90822c40735976a49672e23fa0d365ce53d2c9c194eba7411f239a8d8b53b322c996658adbae10f503b23a63250fda16d52a947fdc92d1ebf3beda95629

  • SSDEEP

    1536:W7ZrpApojswv0EhLfyBtPf50FWkFpPDze/qFsxEhLfyBtPf50FWkFpPDze/qFsoo:6rWpcsHEhLfyBtPf50FWkFpPDze/qFsN

Score
9/10

Malware Config

Signatures

  • Renames multiple (3147) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2fb61b4c8541afd1fb411590a63b9e828b1a278a3a9b5046a91a913b44f86c32N.exe
    "C:\Users\Admin\AppData\Local\Temp\2fb61b4c8541afd1fb411590a63b9e828b1a278a3a9b5046a91a913b44f86c32N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2328

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3063565911-2056067323-3330884624-1000\desktop.ini.tmp

    Filesize

    62KB

    MD5

    b32114a14a5d51abb3acd45392835c91

    SHA1

    c68e68d7612f71220d7c35644376a018a4febd95

    SHA256

    17b977460ec7a6265c740f31dd35b981a9c0d7ac15adcf5e5c4fa618c5fb62d1

    SHA512

    7a16d6c15b48f9609f75983549c990438d278b8a8186f9e0e3e5dc5c8bf04542462b8c69918eea479f80ec84c5de6b3616e36b1078eef280dfa59d27ddc0377f

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    71KB

    MD5

    6c3284b817e52b3b34854a509ea34fc9

    SHA1

    653d83740ed96481cb3f1aa0793c262182d16696

    SHA256

    3f4028ec074e6928c0af34ac59035ea461bfce000eefe234b1dfd4be7ac4cf29

    SHA512

    ac477a932bffe68df603748a77c0bf75acff5e5cea3afd473faca8f44a8a3ce0e2ee391090840e1bd82540e15c38cff48f26735912e4d305fa32a12e3c9229b7