Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2024 04:23

General

  • Target

    cc7209b07792e794202d9400b1c6d98f4753aaadec2ded77eea09572a3f9f819N.exe

  • Size

    73KB

  • MD5

    22ebee9fa5208ef0f9a92d206631ad30

  • SHA1

    0e1593c4d4dee346e96e77316c24098a8b4ce025

  • SHA256

    cc7209b07792e794202d9400b1c6d98f4753aaadec2ded77eea09572a3f9f819

  • SHA512

    22f6492eab550bbca2ff9e2c3344cd565932ef55f113d061049632159d58dcea2b7f9ce7f54fc83e049dfdcd1d48a576971733b8bdb3baef57950b31cf423740

  • SSDEEP

    1536:W7ZppApBULcfpHLcfpX2/Nw/NwmxrLX6X:6pWpBwchcV2WxrLG

Score
9/10

Malware Config

Signatures

  • Renames multiple (3286) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc7209b07792e794202d9400b1c6d98f4753aaadec2ded77eea09572a3f9f819N.exe
    "C:\Users\Admin\AppData\Local\Temp\cc7209b07792e794202d9400b1c6d98f4753aaadec2ded77eea09572a3f9f819N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini.tmp

    Filesize

    73KB

    MD5

    31e682a2ac4d2873835219ce508f68c1

    SHA1

    11a4830b72730666afbf12da123e8719e0735317

    SHA256

    1cfd1d0a3477049a1b5a82ed297656add64581fe713a61dfbc4d14523c576f63

    SHA512

    11780b04e0c9301b13f5e51130207e15cecc4336c80052c2b7dd8899e05ecbe80fd34eae34f5f36aa766deae28f1036ed30fc4b7d569b9d35ccb0182e6b3c0ca

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    82KB

    MD5

    e18f4eaa856566b97bf0ebe678b2766f

    SHA1

    9dc43524c2b99730ca3ef648a0e9585aa7e1467e

    SHA256

    5902853f2e9dccbeb2a98f6cd17eaf1ee4c49cd7189a64e1eaafa53aa394d90b

    SHA512

    37dd924877c2fdb645883d1cd659b23e7e9c7657ffb479b5d5235ce8c0fe3e43174e280dda697a766f9528fa6b31d7e4cbf43d9e4c04b60b189db8c4326f4238