Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2024 01:24

General

  • Target

    7c19416c456c6afe13869a7df50afebe1c4036f6b5e5e698c05ba0238841a9c8N.exe

  • Size

    83KB

  • MD5

    80ac9757c801b0417847fdc400f9c030

  • SHA1

    8f7756fc39c40b7d04c1c152b010072571a32a2d

  • SHA256

    7c19416c456c6afe13869a7df50afebe1c4036f6b5e5e698c05ba0238841a9c8

  • SHA512

    5c09bdeb999dfea3ab585975d72cd654c94799516d6ba2dc4e9bc055cc5044748b02e9d103f48319e37e7b764134c6c7d6c0d1095f302607eb349723a4934d06

  • SSDEEP

    1536:W7ZhA7dAZ1++PJHJXA/OsIZfzc3/Q8asUsJOLKc/xJtLJtTGLtErY:6e76mQSohsUsUKDtErY

Score
9/10

Malware Config

Signatures

  • Renames multiple (3211) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c19416c456c6afe13869a7df50afebe1c4036f6b5e5e698c05ba0238841a9c8N.exe
    "C:\Users\Admin\AppData\Local\Temp\7c19416c456c6afe13869a7df50afebe1c4036f6b5e5e698c05ba0238841a9c8N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2996

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3063565911-2056067323-3330884624-1000\desktop.ini.tmp

    Filesize

    84KB

    MD5

    a642c75007e369c0829f9aa76c1f89bd

    SHA1

    c573e07fe1f5552aedaf47b5631b94d06e15ffe7

    SHA256

    b836eaa10ea8a306a7cd3a50fc06fa1a35f516c8a11e63a51cc078a157783003

    SHA512

    69f09231fecad8115f1fc82c9928c156390d762749fa9ab9904263aaf1b039aff7472b7b1745b31e37710f2ec46ad5317224c74751359d4c631ac112f10dbc23

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    92KB

    MD5

    a1184b3188a30131f7659085688ae4f6

    SHA1

    54e1bdc933692c26a54b355a774580ef4b406c36

    SHA256

    90505382b8f442c4d4e309545df12c4c0b6d408e325883f1aeb68cd66903c039

    SHA512

    6d95b61eb3c4d139a0cb91213e8f7289172689d49d88501667d2cc4b5d08635824fbc8ea5bd6fee0b12ad0ea9a3d90731b60248db56e29548472209fa05f7ad5