Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    06/10/2024, 10:24

General

  • Target

    6b9b3eb4f66b4406297e3dd2a62720976782fc6d6b644bd74e85a1e56d5fee55N.exe

  • Size

    49KB

  • MD5

    640e71e0145af2ada9918fc46b5b3c50

  • SHA1

    6200fea57020bb03b88e1b9f1556ff3aa9b3afee

  • SHA256

    6b9b3eb4f66b4406297e3dd2a62720976782fc6d6b644bd74e85a1e56d5fee55

  • SHA512

    bb390336ae4e2b02d388cf3bd1939f2f426d0bfb879f86b94ad163d6bb9ccf5a80b82415feae3349c9c36552a7ae00de93c78ba3fdfe28fbf3a82966141f249b

  • SSDEEP

    768:W7BlphA7dASbSjJJcbQbf1Oti1JGBQOOiQJhATBWvyBh85c5Hjn:W7ZhA7dABJJZENTBWv36F

Score
9/10

Malware Config

Signatures

  • Renames multiple (3774) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6b9b3eb4f66b4406297e3dd2a62720976782fc6d6b644bd74e85a1e56d5fee55N.exe
    "C:\Users\Admin\AppData\Local\Temp\6b9b3eb4f66b4406297e3dd2a62720976782fc6d6b644bd74e85a1e56d5fee55N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3004

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

          Filesize

          49KB

          MD5

          3e1ead459b68153bddbead48649ee11a

          SHA1

          87f44a68ce7e53cdf4e04d0e75ecab4265b999fc

          SHA256

          c25f06d801ea92d5db280eee037263d4277f477685a6165f36ca72c937ab23ab

          SHA512

          8dbc876e0685c3ebb2fdbdd75f8e7eae51422a809a571c3f6be9c0d86544b351c0424aad48d4661e3c5929af1b88e3fc284531954cfef02216874ad142a5dae7

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          58KB

          MD5

          d836fc4eb9df04121d987ce9c315878b

          SHA1

          d614d4d9785a86f87283738fa8e41a5add6ed7fa

          SHA256

          2624deb943995b39ac5ca6bd85471798d19f39cd85c1687926569d6d0b7c7242

          SHA512

          a62a02798b2fa58eebcd3e96b09525be6efe7ac19eee720bed5ff5c4017c108b5da060a831d18f10ced58e18190911559f193b300104795c28f6da09ee5caa67