Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2024 13:24

General

  • Target

    79e004808609579c0c0143f3f614fec37dcaf71a6c8ad41dcfa73c5047b77976N.exe

  • Size

    39KB

  • MD5

    9f3e06180fd6ae1fb88a17b6d3be6a30

  • SHA1

    c3250317a7a3c5d0dd40f5bf3029cb205b9b84a8

  • SHA256

    79e004808609579c0c0143f3f614fec37dcaf71a6c8ad41dcfa73c5047b77976

  • SHA512

    33d8dbe2dccd23f46a44bb008bf5332af56f9c672819309b97719685dfc93c87323610e4bdbe704fd0e13114cc339503500b48065a03b4c7e81a3f9ae0a8ec24

  • SSDEEP

    192:pACU3DIY0Br5xjL/EAgAQmP1oynLb22vB7m/FJHo7m/FJHA9jxjc8P8dzNNlNN+3:yBs7Br5xjL8AgA71Fbhv/F1UXNHNWV

Score
9/10

Malware Config

Signatures

  • Renames multiple (3393) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\79e004808609579c0c0143f3f614fec37dcaf71a6c8ad41dcfa73c5047b77976N.exe
    "C:\Users\Admin\AppData\Local\Temp\79e004808609579c0c0143f3f614fec37dcaf71a6c8ad41dcfa73c5047b77976N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-312935884-697965778-3955649944-1000\desktop.ini.tmp

    Filesize

    39KB

    MD5

    662275d803d33e5d06e788c5da7c82de

    SHA1

    0fbc0ac3c4bca9996f5afbc4b417471e4f06038a

    SHA256

    f2b937a35d473bebff4f28decace56769b479733e6e72ce848d7bef65ecfe6c4

    SHA512

    1c7c36aa0ec671452cbd0dd7515974e79a488fe2daa86541022e69f5389a691c994f8b40131592884f5018e4fc501b0cc6e26bb4e20f545e8bbbb086ee051619

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    48KB

    MD5

    6c50a13d84adb09cbc4c48c6f9e17c92

    SHA1

    7b48c1a6759c2e5b188b4d8c360ca5c32c89443b

    SHA256

    12cb094c709bec7dadae9732a92979202d94b999fb689b9239004ae32f5ddbb9

    SHA512

    f0315f2f584f1d94e05043a37b105dc2f216ec848a1c54c5821f64537c81e2046b29101c4ea9312a71403d932c06c26ea5bffeb7111c337beaf791c71525e066

  • memory/2404-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2404-72-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB