Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2024, 21:02

General

  • Target

    678c3982a165c0b1b39e736fc07ddabce4a066d9c3b44bcdf943f7d53609d0c4N.exe

  • Size

    46KB

  • MD5

    6f9929c744e0a520dc80d560a4941d10

  • SHA1

    adb2ef15823f4942899044bf10375d92347efe64

  • SHA256

    678c3982a165c0b1b39e736fc07ddabce4a066d9c3b44bcdf943f7d53609d0c4

  • SHA512

    9b99d4c8178d08378ae4fbeefcf37295bd9a2348b278e04e969b9c33394b4abbe7425c8e8139a92cc069464e2473720d41d8d61ddd4d253a4f1e28fbfa8f42c5

  • SSDEEP

    768:W7BlpppARFbhHFoqAJwBqAJw1VyjVy/3U:W7ZppApyVyjVys

Score
9/10

Malware Config

Signatures

  • Renames multiple (3275) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\678c3982a165c0b1b39e736fc07ddabce4a066d9c3b44bcdf943f7d53609d0c4N.exe
    "C:\Users\Admin\AppData\Local\Temp\678c3982a165c0b1b39e736fc07ddabce4a066d9c3b44bcdf943f7d53609d0c4N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1846800975-3917212583-2893086201-1000\desktop.ini.tmp

    Filesize

    47KB

    MD5

    369be257c9764aa9d813e30ab4af4b4d

    SHA1

    d6604c85ee97b7caf8a0be6d661d603911f59270

    SHA256

    9ab0d9ea6397bb9c361ef7ec9487feb1b1ae5433242692340b4a9b6a6b0d5c01

    SHA512

    2b2af3b9ba1b3a17214179018ee39d25b25fab7bce76d52f396cd39651df5223232804e40d86adb8584ecd0d1bf18444cd9e9f40c232f5b5a5cc913e29419059

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    56KB

    MD5

    3b5e4795665aeacd25389a98ae9b45d0

    SHA1

    acac1bdb3d22d279ab0e545dba75310058d66f75

    SHA256

    23c4d80190e0310ee104eecf9fe1521d984b75b837c7b9cf8150f97915f12885

    SHA512

    f8a65b5e48664c4596d7911f1968cc9291da553fcdfdc5bda21924c232250604ed63755f75af7c2f24c6a2148d4fe78b5f8acbf881c3d780c3feb2bc94d13433