Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 11:24

General

  • Target

    3d950359b17fd870b86652d80dae78beb24b16aa809410ed776d49473bef87a3N.exe

  • Size

    65KB

  • MD5

    43d6e5384449ba811def2858191e7f10

  • SHA1

    07ff5ad4b240e93c5959d0467b9357310b5da669

  • SHA256

    3d950359b17fd870b86652d80dae78beb24b16aa809410ed776d49473bef87a3

  • SHA512

    89b9525de55b04bfcd4276588fb55b0e97090fa58cc037042cce0d05cf11df0cdf247d7d08e3b53a7f21523080188e6500e1222a4612449f7765dac62dd5f342

  • SSDEEP

    1536:W7ZrpApojswv0EhLfyBtPf50FWkFpPDze/qFsxEhLfyBtPf50FWkFpPDze/qFso5:6rWpcsHEhLfyBtPf50FWkFpPDze/qFsg

Score
9/10

Malware Config

Signatures

  • Renames multiple (2649) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d950359b17fd870b86652d80dae78beb24b16aa809410ed776d49473bef87a3N.exe
    "C:\Users\Admin\AppData\Local\Temp\3d950359b17fd870b86652d80dae78beb24b16aa809410ed776d49473bef87a3N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2188

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3063565911-2056067323-3330884624-1000\desktop.ini.tmp

    Filesize

    65KB

    MD5

    5a35eb4e4cc7c0d05dad2a528c1c0075

    SHA1

    3379ca1455fc440b9395d911ed976e64964d6492

    SHA256

    67bebefbb8b7ee35d9749df1e16784ca145d1e1d72429ae154965457f2e27637

    SHA512

    18c9dabbdf5dacc8ea96c661816288beb1f5ff0dd302b5596b28f42eaf59e4775c437b93dd422b2b7f7798685bc3a285775720be697bfad506a2c09cddfe2197

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    74KB

    MD5

    c6b7a92c8d5c871036accbe6eb545610

    SHA1

    788e0ba2fed81d896fef8398ca322eff4d37ab4e

    SHA256

    5f88e565f8a7f91f8152e78d34380dd4bfd51f00014f2916d46c58d9ae9831fc

    SHA512

    f5e6feb2792d28ad70da5b9e3e380b62be113b658e32b08428aaefc26abb38169045e68e3cd69f9b8b2f457499e80fc317a3c170c6d23a6bb606d6ea2ea66f28