Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2024, 01:24

General

  • Target

    32706f28bd0597b33d5f55cc85e39304f694d6a58fa80fa9eaf15256f0908c08N.exe

  • Size

    84KB

  • MD5

    a174413c1c79bc41cef4e77357b3a970

  • SHA1

    4431a9cbdfecfacc445374738095d7ffc17fdb35

  • SHA256

    32706f28bd0597b33d5f55cc85e39304f694d6a58fa80fa9eaf15256f0908c08

  • SHA512

    49149ec855d3360bb65626cb9c63e8ff9a9becc670d8ee2652ff6f56aa10fef05af11c67268b3146662a9ac7626dc5e3d1a25eb77f6dbe09f512c886a2c17568

  • SSDEEP

    1536:W7ZhA7dAZ1++PJHJXA/OsIZfzc3/Q8asUsJOLKc/xJtLJtTGLtErp:6e76mQSohsUsUKDtErp

Score
9/10

Malware Config

Signatures

  • Renames multiple (3153) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\32706f28bd0597b33d5f55cc85e39304f694d6a58fa80fa9eaf15256f0908c08N.exe
    "C:\Users\Admin\AppData\Local\Temp\32706f28bd0597b33d5f55cc85e39304f694d6a58fa80fa9eaf15256f0908c08N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2636

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3290804112-2823094203-3137964600-1000\desktop.ini.tmp

          Filesize

          84KB

          MD5

          b575a7e24917e85ca91b7c99043783d2

          SHA1

          4e9b71137b00ebdcb5d3f5e1f59888041da19515

          SHA256

          9d34b1d51bfe1d6bfe34fffb197ded0ca860b89b8fa212fbd9bc366d047e6c5b

          SHA512

          90f1eb6c4f7f58cb68e15d6946790d5fa52da9a667cf57d25bc6ec6854ff9375d9ce2d35db2f6a5e66aee324681b4d97d235c9c603aa20013bb07254d9b9f371

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          93KB

          MD5

          a81325466feb0c41ceed748bdd381784

          SHA1

          b071d234ea5c89a49f7a9157ffd2ad766ed5afb3

          SHA256

          a3585d5df32fb7e076711378195d799ab846dbb81c28ae2b0ab01d6f2bb470ef

          SHA512

          f8a9cc0ac150595d4114b79e8c862347393f977a6583433099e61eae13080a89e39a0fdd9778a1e5e47e5fc2db99c31c942c5bc4338f54f4bb7216588b09ac42