Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    05/08/2024, 23:04

General

  • Target

    1e6e320a0da7862d73490a7c0e1bd8c0N.exe

  • Size

    39KB

  • MD5

    1e6e320a0da7862d73490a7c0e1bd8c0

  • SHA1

    afe7938f372fb02a7c8277fa48f19369502823ed

  • SHA256

    1ec8f6fbb612bdb542b6d264fb935fcd6bce3c824a7b9f6dc210a46c43d72d6d

  • SHA512

    40d0592a976448956f0fb1ced6cb0455c18e2b1a760ab9bd75aabc4c587d2e764e61aa1d40b831eda02305181837db6d5973854768bb0ec42ec01d8759ab141a

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfproFNFjqAJLOqAJLm:W7ZppApBULcfpHLcfpyDh

Score
9/10

Malware Config

Signatures

  • Renames multiple (3164) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e6e320a0da7862d73490a7c0e1bd8c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\1e6e320a0da7862d73490a7c0e1bd8c0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    39KB

    MD5

    d1381ed243db27f6942ce556eb3ed912

    SHA1

    0bf5503e55c9bcc44f24b732fe5d366c9c5738ec

    SHA256

    301df5bcd6d29282b74aaec5e4512c484bbf9100f46993ed0d762da849e6c565

    SHA512

    0d867eef9623d498ae00ff4440153cef6ac33e27f5e2de78546738cde60b916661e9c94f72451fde162d5649589dc4538eb8469d7f0dc810390f445dc4cd5eb2

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    48KB

    MD5

    7e6223ae0dd6a2b16c99ca51fcf75a9c

    SHA1

    ae708c8957b16b916236ec8947d4d92659b74c00

    SHA256

    76ce8338bafe91764cb647cc9eb39d8057d6cc998ac92de17fc6705171f4afc1

    SHA512

    a9675602dc768d8e68fa3b15d58c49f568f8394304ca787f558cf9db1a9ce9a367c34c526a114cf46eb7317e11e95a5b5e901e6e37aaca8fa73bb2da0ab3cc3b