Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2024, 13:35

General

  • Target

    f8240ccba1eafe1b070e3602a0d0e591f4997cdd053420363ea85348fe748b76N.exe

  • Size

    51KB

  • MD5

    0f17e4d4ca384fd3af03229cade975a0

  • SHA1

    c0f9f741297fef05e731b3566eef6d05829fcd49

  • SHA256

    f8240ccba1eafe1b070e3602a0d0e591f4997cdd053420363ea85348fe748b76

  • SHA512

    90b1d220eec0aec3d19c27f65521774ad9681edd40c3ef17bb2a9be5ee293228c4ea3ed2333fbd95663315609e3194d1a752c468611d9a362bc8091d9477ab52

  • SSDEEP

    1536:W7ZppApBMyKoIWbsHfySkT5GeCyi348oWGRPOzkjId6q8UdrSD+kCoIfL2YwqAF7:6pWpBMyKoIWbsHfySkT5GeCyi348oWGh

Score
9/10

Malware Config

Signatures

  • Renames multiple (3779) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f8240ccba1eafe1b070e3602a0d0e591f4997cdd053420363ea85348fe748b76N.exe
    "C:\Users\Admin\AppData\Local\Temp\f8240ccba1eafe1b070e3602a0d0e591f4997cdd053420363ea85348fe748b76N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2672

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4177215427-74451935-3209572229-1000\desktop.ini.tmp

    Filesize

    51KB

    MD5

    ed170a629d5678a3088307223e3ac9db

    SHA1

    815f5fa054b5a477c494fe28f9393cb61a06b32c

    SHA256

    1268c05981e00f0130fb59efc811db89d0844b9f775f16cd70746731ba23b70f

    SHA512

    463fd2e5a7c111894464f65c7d3b5552f3e9f79471770d94e8ba85c56dacae4529822da645f4714a29584b89684785b3c6bec6233c1c7607aca34a1038d571a9

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    60KB

    MD5

    8d66e0e7e08a60f0988fff97293ba38e

    SHA1

    c22678fd55045e5a01cd423c38d5492e94f5fa6b

    SHA256

    b5ef3db219458fbf0143266149f9ce304ae70b1949b3161b62333e85f1af9325

    SHA512

    025b9c3469963c354d81278ddfa604261ccd6f799cfae2d487e19efd57e9e3c8cf874922f6d3db71e38f7dffa94e7833d3482df47645a2fa8805c0273c0b675e