Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13-10-2024 12:59

General

  • Target

    af7056422409dbb2535897228c68c5eb119c6916212a25c5d2d283381e23d6efN.exe

  • Size

    41KB

  • MD5

    8b06ef437e5b23f27a979d7f02514360

  • SHA1

    8f77e1325c94bb0cdb15485ac01b03d80ac5237c

  • SHA256

    af7056422409dbb2535897228c68c5eb119c6916212a25c5d2d283381e23d6ef

  • SHA512

    ea02291e7059b64198215e421cf6c6eabe4e324937f6ae6edb882c31b53b567ad3078a681e50a8e9dc4ac41aee607c9e887e8f0cd1ce506b6cfd1fed90f6b935

  • SSDEEP

    384:GBt7Br5xjLfAgA71FbhvtPcNOF8F0qOF8F0PDXxhDXxW0C2ChWu:W7BlpDpARFbhmauaLXxpXxW0C2Cd

Score
9/10

Malware Config

Signatures

  • Renames multiple (3249) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\af7056422409dbb2535897228c68c5eb119c6916212a25c5d2d283381e23d6efN.exe
    "C:\Users\Admin\AppData\Local\Temp\af7056422409dbb2535897228c68c5eb119c6916212a25c5d2d283381e23d6efN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-312935884-697965778-3955649944-1000\desktop.ini.tmp

    Filesize

    41KB

    MD5

    55ee84ed7b8209e7267d367baa196966

    SHA1

    f3f878152785a998ca50a27c435742346abdb3a7

    SHA256

    c7614dfaac0793296fd0ddcea08a6da8556d578a5982f0ab68bf7bcfc22f9248

    SHA512

    abc063036fbf020070e92b784f58b150b27d3543b2cd24afc083abd5e4c7897a2bf6f820d8064341e716e30380450911648787a9c6922829d57671d8a5f2f076

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    50KB

    MD5

    ada0125bbbec1dd4efcb6460c1e7dfd6

    SHA1

    b447cf8b0a00bc6ea4be8be0df0001c0374d91c4

    SHA256

    06759ea2c51b17859217bd158068b1bb55d810101d3f9a284873974d23fa2281

    SHA512

    56820d018f9e3fdf0322fbf72be3aa2a10a5aecb44881ab7bdedb5b0cfc3e24edd41a4e0cee96b4744707faef763d40882bf831e42446d6916672b9a936368e9