Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2024 09:32

General

  • Target

    31f88864e4e8b0e69707bcdc2aa9ba45a360e5b7bfa056308d1f874b9667691aN.exe

  • Size

    100KB

  • MD5

    f4e71bd16dd33b01fe3e7942185adb30

  • SHA1

    79cc62e578fa400fbbc7f448cdc3dae6a73a5e49

  • SHA256

    31f88864e4e8b0e69707bcdc2aa9ba45a360e5b7bfa056308d1f874b9667691a

  • SHA512

    c31de266e6123b55e16833777e8518473ebec1bd10f0ac70c3e83857c1eaee4e65017c8ece487e9c7b1e8af29d906401e5c47a7a86ef194ccb3447a8449a6691

  • SSDEEP

    1536:W7ZhA7pApH9QHwtRF9ESWu0SWutlggalggEpVp+ESIXosbosP42:6e7WpHIyRF9ESWu0SWuDmmSIjX1

Score
9/10

Malware Config

Signatures

  • Renames multiple (2958) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\31f88864e4e8b0e69707bcdc2aa9ba45a360e5b7bfa056308d1f874b9667691aN.exe
    "C:\Users\Admin\AppData\Local\Temp\31f88864e4e8b0e69707bcdc2aa9ba45a360e5b7bfa056308d1f874b9667691aN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    100KB

    MD5

    997bd6928cb01a45b71891df42bac670

    SHA1

    fdac83476be2b9e047c99c24f37f3b8a8423f610

    SHA256

    7b0997eb31da154d41810d1bb789bd73d465ae701f04f5a735bb04c316e33f99

    SHA512

    9796335a4a77dceea9cd608a4801f0be249aca94cc3c7129e4fb492182c1bf338269be565ed2fe0dff1810b99966c0c58e85869546d2bd1a97170a188f3a30f2

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    109KB

    MD5

    c325aacdbe6ea0dbc6b7a910dbfc52a3

    SHA1

    a484574224b6a5a576643fb4f4917db1e1434702

    SHA256

    63b8ee6a2db38a985c1dac8f0a34f6db07631b40d382c9edf7bf38d3d83332f9

    SHA512

    36298349be2274f7a67cc52e6d67d05b9823b7904ce7ef9608761ddca5ef88458229b66285381ca6e504e51e9f4deef63da7055cc1066e429cd45f82e8e1b933