Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2024 05:14

General

  • Target

    9733556e5f593b859e77ce1157ec28981180e2f333dabf92bdb3fc266a6077e4N.exe

  • Size

    101KB

  • MD5

    7fb22e3fb87f1073b325c4ceb206e0f0

  • SHA1

    e8cdbc14ff5fbbd4c5ff2b273be972ecaf38ac54

  • SHA256

    9733556e5f593b859e77ce1157ec28981180e2f333dabf92bdb3fc266a6077e4

  • SHA512

    566882d148d22f4da8ccbecf157b8f365e6cda35481efb5b7b9039de3792e8be3b4698516b2d09a3cae50ba97ec70d1d5fd399f61f1cf51fcc04d2671bc369ef

  • SSDEEP

    1536:W7ZhA7dAynMdyGdy4AnA4QlcHgrC35rtLgnTVoA1:6e76ynpAi9InTV9

Score
9/10

Malware Config

Signatures

  • Renames multiple (2837) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9733556e5f593b859e77ce1157ec28981180e2f333dabf92bdb3fc266a6077e4N.exe
    "C:\Users\Admin\AppData\Local\Temp\9733556e5f593b859e77ce1157ec28981180e2f333dabf92bdb3fc266a6077e4N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1163522206-1469769407-485553996-1000\desktop.ini.tmp

    Filesize

    101KB

    MD5

    d24e0dbf544c2d3573f17a28dab09243

    SHA1

    1c53b703c43c2ba0d64b35ec6c5b63d9bf903f37

    SHA256

    35f0604eb798a72ea88616a445c386e544c6907402f427e54b5fc1f3b09b2b45

    SHA512

    cbe63909234d95f7b9c392fab898d2033d09c16d5242ee22ea51b12f50549d3d2832e51b2504f85094ded5d7691af0f3c37aecbefa73606f4b02b1c4547b2d7a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    110KB

    MD5

    e02baf726e90e1c3f8b44d245e2bfa15

    SHA1

    248488bd65705b5311bfd3abc5c7a2c20033efc2

    SHA256

    5321dc6daeb5c34d62820f4cdf5df60bc82c7cfb0227eef3dcad2b9f5b816ecf

    SHA512

    cf18a2f2e26170fa37140a3470fece7ccc52eef683bb88cb4ee9e517ef2cae740807569288475e43818526460077f99241064c25ae901ec2abfa722c10fcdc56