Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    05/08/2024, 22:14

General

  • Target

    14c94c16b8b0ebc21afa9b8005e590a0N.exe

  • Size

    35KB

  • MD5

    14c94c16b8b0ebc21afa9b8005e590a0

  • SHA1

    da472bebb0a1036724c0b26fd6601591219d2233

  • SHA256

    7c511f6c1e6c36c3caedbf48e3a2dd34c2baf214e3c7ed7bde1b0ecac08f57b9

  • SHA512

    a355886e28e5f4648e281addfab44ce64027d42f482af2bc7dfdb082995926a52f7b181d04374284d0dfd965dc272ba8ac117c26dadb6f08f4d79d43f387b2e5

  • SSDEEP

    384:GBt7Br5xjL9AgA71Fbhv7bhvo42L5FgAytBpR42L5FgAytBpdjk:W7BlpppARFbhjbhg42LcfpR42Lcfpdjk

Score
9/10

Malware Config

Signatures

  • Renames multiple (3418) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\14c94c16b8b0ebc21afa9b8005e590a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\14c94c16b8b0ebc21afa9b8005e590a0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2408

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

          Filesize

          36KB

          MD5

          37a1b6cb37bf778b78b9258faf1b169f

          SHA1

          531dcf7337435f33fd1b7331cc06f437058fef22

          SHA256

          d343f0aefecc9e250697800e4254125e32dca81ec5ce77fc452eeed504c47db4

          SHA512

          7bc381a1ba87eea5400e4bba75848b8c778f19029425fe7fac1786bf74cfff48712b99640a8423765aa5f87ac083bb6c7e72e307446d731885b6957049481fa6

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          45KB

          MD5

          f5cd00073294be14f0445117b3494b5d

          SHA1

          ea1fb086debaa0d5678cca8a5438a9f212977d91

          SHA256

          8359b309256870ab11d2bdb9fc23baea43977a5cd3d0da222270dbea1daabc2d

          SHA512

          6e1edd49dceb88bba64af6d9bd887e6ec2db44b083dc6c16c59196a07489607f4c0d88abde045eec02bdc480dfd962527eaf4a97562f87b7160e5e905b146f05