Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2024 07:40

General

  • Target

    1b9ff849f23ac8b17cb197071251c9519bc6306b3d6c4d1ca7848cf7c80ebbceN.exe

  • Size

    48KB

  • MD5

    c96009fc4e5015b0d7824861a2b9c640

  • SHA1

    8a2b3fa9ef32bb9d4c78c1ac58432b004a173b1e

  • SHA256

    1b9ff849f23ac8b17cb197071251c9519bc6306b3d6c4d1ca7848cf7c80ebbce

  • SHA512

    f68e81946fed99e21af51fd55b162130912105e03743a76c7a97658971c64b20a4e328380071202ca57621bf34be1f4b9f96c1dcd007f7320d7692e6e4e973dc

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42Lcfpb2N231F1itvtBj9:W7ZppApBULcfpHLcfpSo3fstvtn

Score
9/10

Malware Config

Signatures

  • Renames multiple (3426) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b9ff849f23ac8b17cb197071251c9519bc6306b3d6c4d1ca7848cf7c80ebbceN.exe
    "C:\Users\Admin\AppData\Local\Temp\1b9ff849f23ac8b17cb197071251c9519bc6306b3d6c4d1ca7848cf7c80ebbceN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini.tmp

    Filesize

    48KB

    MD5

    be8bf34878080bf270a8ab12d993ed3f

    SHA1

    d083002cfea810b751135f1f55aaa01e56bc252a

    SHA256

    01f1af8ff79fb531380b336e4cf22eb35bbfbddeb86ae148ac39c0d01f465041

    SHA512

    c35fdc68181ecda8767aae9218d27f786207cd738fd4a066ba2a6a1181165de8820b5ae054db936572033600a81f41959ee46f770928ae9ff02a1a26ba298e4e

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    57KB

    MD5

    354e318450065f63fd6f4ff5fbdb3211

    SHA1

    986f14a502789388dc1021df2d222064bdba3725

    SHA256

    51c467be6a6ffcccdba879e7a77c6e254028201d698c1fbb08dc6026f8596bac

    SHA512

    f7a317a298f0034e3f2dc1676e4c43612c293db24d0a754aa4601a8334c4992810bafbcfe0af0e2dabbcc6c4dbf83e0ce86cc4bb7918896156d306395de6acec