Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2024 10:49

General

  • Target

    1d8afe76040d5fd52b2a9932ea949a56eac0c40deeb2694737aa828bcde2f040N.exe

  • Size

    52KB

  • MD5

    ff6ff155f94130bf420199c0c7b86680

  • SHA1

    5f4217c3dfbb55ba3dabb86d8d59393ff9f341f1

  • SHA256

    1d8afe76040d5fd52b2a9932ea949a56eac0c40deeb2694737aa828bcde2f040

  • SHA512

    8f6fa69731a4459eb111c014648b0790874a1c86a662e23e09cf3ed27bccf29f4289f53f83dfd92b617bd18aaeb6b88f7cf46f85616007270fcc84114ff88a44

  • SSDEEP

    1536:W7ZppApBULcfpHLcfpSo3fstvtPYcUYc6eMa+QeMa+U:6pWpBwchcUtvtxeMa+QeMa+U

Score
9/10

Malware Config

Signatures

  • Renames multiple (3410) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d8afe76040d5fd52b2a9932ea949a56eac0c40deeb2694737aa828bcde2f040N.exe
    "C:\Users\Admin\AppData\Local\Temp\1d8afe76040d5fd52b2a9932ea949a56eac0c40deeb2694737aa828bcde2f040N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3063565911-2056067323-3330884624-1000\desktop.ini.tmp

    Filesize

    53KB

    MD5

    d14dcffac972a58b6d8815d5ec27230e

    SHA1

    566f1cded067e720fd51b576f59abb88bed6da51

    SHA256

    775e3084f33683f456887448c5401662dcbeaf1120b07fa2c5fb0b389c75ff06

    SHA512

    5b1e683319be993b3a055030cb44fc8b2831ffb45e221f8bfdc60c52fb9797f6a71dd0759347dfdf162ff0848f435ee758addaa645a3bd4737a96dbc2aac184e

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    62KB

    MD5

    2446a19c3168b372b61998f02226f25e

    SHA1

    cc246ddc85f7b7cd7c1dea7c79fd70c0fe2e69fd

    SHA256

    9dcd5b50564df5142594865237ccdcc86f5e61122f8efc5bf07ae0276f7bdd56

    SHA512

    b49357377a19ed27eaef23d44ff19d37647ad02e812b9bdabe9be09862080d2a308f1cdc6c35cd2e2d925d3c25d659050477ebceca4a86d47009ebe86b1a4b90