Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10/10/2024, 09:53

General

  • Target

    7f689f893f4f9bfa4301fd1e5db2b5d4642a4fcbf35d5e3dc7d4d3786439f0b0N.exe

  • Size

    57KB

  • MD5

    6e201e50e1b4b85769c104108f762ff0

  • SHA1

    af8407e497bbcf5d5168122d716afad72de8f060

  • SHA256

    7f689f893f4f9bfa4301fd1e5db2b5d4642a4fcbf35d5e3dc7d4d3786439f0b0

  • SHA512

    c769c52d3fbb19d9372bf8dc384d0a52378de7d4b259950612245020ec0a700ace1f0fbfc6478286f919d88ce93c64d74eba8b1ba3db77bcbd5b7a31881c264a

  • SSDEEP

    768:W7BlphA7pARFbhL801VvM801Vvv7lSKSW7afHFCSW7afHFF:W7ZhA7pApw03vR03vxSKSWu0SWuX

Score
9/10

Malware Config

Signatures

  • Renames multiple (3769) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f689f893f4f9bfa4301fd1e5db2b5d4642a4fcbf35d5e3dc7d4d3786439f0b0N.exe
    "C:\Users\Admin\AppData\Local\Temp\7f689f893f4f9bfa4301fd1e5db2b5d4642a4fcbf35d5e3dc7d4d3786439f0b0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini.tmp

    Filesize

    57KB

    MD5

    13bfcadb3394f4f22e09750fa2ae7cbc

    SHA1

    5ceafeae237f0e799188d57b4ef23fe62db2a2e7

    SHA256

    15efd5f8b2b337d0f8c6307626494224a5e95fa86443b6975bb5ac3516a20f79

    SHA512

    612fa28f39d0a409d3b8cd1ae35670a5ba5180b2bc8986b089811052c81ef37784944c92e72fdbd8880579bec21bedc7f41ffb1150f87fa42b97126d689601ea

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    66KB

    MD5

    74545feda582cd6dadaee69b07c6a029

    SHA1

    fe1b97790979c15d5bd9e27c56d703298bcc2067

    SHA256

    6a2512911825af4cd1292edd0b75a1e6d23a16cdf3d53616d664aea901a4be6e

    SHA512

    418f72884e792b487ec3998c429cc81d5b71af51e4e440a60301953652fcf959bb3af8697191d19cfb34c24993c896cd7738eda05cc50a7637d57ff1da30b3a0