Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/10/2024, 03:40

General

  • Target

    49552914102c29bc156167f3d3ad3f777d7b24ef080b27afe50c3141a27fdc30N.exe

  • Size

    51KB

  • MD5

    8aa3eb8bc27d7cc06b56e852735ae030

  • SHA1

    bc3cc357179cddb101fa956ac81b67f27c99d0a8

  • SHA256

    49552914102c29bc156167f3d3ad3f777d7b24ef080b27afe50c3141a27fdc30

  • SHA512

    a712389b516a4e53a4d61b2fb8ca5617eefb471215aa5202cb2e952252cdcab7a9b23961b87235e233ad1274ef44048aef1ab22acae41a9b5b0d7be92ad8a508

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LOd+QRA88O1ggi1x+88O1ggi1xYV0U:W7ZhA7pApM21LOA1LOTRAsWysWkWU

Score
9/10

Malware Config

Signatures

  • Renames multiple (3738) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\49552914102c29bc156167f3d3ad3f777d7b24ef080b27afe50c3141a27fdc30N.exe
    "C:\Users\Admin\AppData\Local\Temp\49552914102c29bc156167f3d3ad3f777d7b24ef080b27afe50c3141a27fdc30N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-312935884-697965778-3955649944-1000\desktop.ini.tmp

    Filesize

    52KB

    MD5

    5158d337bc109b83a5d33d63e8652174

    SHA1

    5f31cbbd147bd036568dc4ca38e75a361c39b097

    SHA256

    d7e6df4226352bc6590e54587f7888d69a405aa4e27de37fff37c0d93ba00003

    SHA512

    d04c33f23af8fd8fc4bb1039769fcf1281c0016c3cd0599cbd8ec234f16ac491ae25dfdd64a0258078638b1faf9a89a615e2cc10bedf73a70d5dcf7eab869a1d

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    60KB

    MD5

    1087689984c5af626ce4ac575ddd5a94

    SHA1

    14dbc8eb8ecc6dc5e3993ac3e041dffed23d0364

    SHA256

    03b91f032c8e824a8d8f7614ef127961bb30e4879b2e72145837afd9f650c26e

    SHA512

    c2d651840ba58fbf1f170b05db716d021ab30e221101ace9567bdc89d0ab79d0af835379088ee4de69b7d1cf1449ae51d13ebdae132481e8037b1e7ef07ce66c