Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    13-08-2024 15:42

General

  • Target

    d4330d60a9ba05a1d5f000807c3c02a0N.exe

  • Size

    42KB

  • MD5

    d4330d60a9ba05a1d5f000807c3c02a0

  • SHA1

    051c1c2418afb1a711d6624f8d9a295b155b02c3

  • SHA256

    3aceca468c434056554527785c23f6d2734926aa26b7a557e40b42f67cf41a3f

  • SHA512

    d7dc1f5a2c8275d4630e4b376d3d192d8aef58fb7b8e7c9bf740775df931e6d7de05fa4628defdc72d1b5444e98e6080a60134c299fda4101210a0a43614d4ae

  • SSDEEP

    384:yBs7Br5xjL8AgA71Fbhv/FzzwzrYcUYceQ9HsQ9Hr:/7BlpQpARFbhNIrYcUYceQ9HsQ9Hr

Score
9/10

Malware Config

Signatures

  • Renames multiple (3322) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4330d60a9ba05a1d5f000807c3c02a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\d4330d60a9ba05a1d5f000807c3c02a0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    42KB

    MD5

    dc3ddcab6c1e8118c59e8d7eff049bab

    SHA1

    b747f7ed8e05086202f394dbebe97cac61e726c9

    SHA256

    9d046e33edee746fcc649be11a59e67327b734d40a77040696389029e56d67ee

    SHA512

    485e269447a380e793893a2f78b79ab91e7e10407a378c5672d5ea9e15ce68c1d736b7ff58bccb54a72eafc0f68ad641c075043d024742ad2807cf6ef46bcf18

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    51KB

    MD5

    f5dce0ee743268098aa46f7261f103ed

    SHA1

    65b11cd709e323ab96867d3d375149ad0297d5cc

    SHA256

    05db77ece00fbc2f7539941d9b73d4f7d342e14d818242ec9a6fa82a4d8744e5

    SHA512

    a090e8d767b88e5051242bba062a26a5e08dc8b3f11bfd35f966a7277b3767c4060ed7ef9c47f258aea16593e077aceef299a8471feb5fe887fed08e8505373c

  • memory/2576-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB