Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    13/08/2024, 17:35

General

  • Target

    d9e5d87a8a6206a544f667e55f39b570N.exe

  • Size

    69KB

  • MD5

    d9e5d87a8a6206a544f667e55f39b570

  • SHA1

    4b553ecbaaa7b680dffb97649af0f1fb07b0200d

  • SHA256

    ea3cb646bf4beadd4f33ccf7260636b746999dad031416b42fdf61f74d5f4219

  • SHA512

    977ef1d88b2e2dcbffbc9f28caab796c19ab50db9b787dd12d44b3e65b545807d5bf46635e77f59ce9906839093179388550b44b0ed00f37ef19658fb574b2b4

  • SSDEEP

    1536:W7ZNLpApCZrt8PWGoPWGANdN+hEwHwDvZvG:6NLWpCZIzjwHwM

Score
9/10

Malware Config

Signatures

  • Renames multiple (319) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9e5d87a8a6206a544f667e55f39b570N.exe
    "C:\Users\Admin\AppData\Local\Temp\d9e5d87a8a6206a544f667e55f39b570N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1624

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

          Filesize

          69KB

          MD5

          2ad9640f26ebdfaf03dee5263f9eba18

          SHA1

          c902d7ef13c03d784f53f8c9b5948715e78d4601

          SHA256

          47f74b089af1b6f06a6f5ec81f3a80aa3e008a23aeaeb14c51658da21f1d1335

          SHA512

          973c8c2bab3aa8a9c3d928275add6fcaa95213d67d5e4369e9be3432e8a7050381438248b9f2f65d94b4527f6af1975b7dfdc6978bb7f4b2c22459f786abaddb

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          78KB

          MD5

          48d4ebd0fe22da5e18827522571ae0a6

          SHA1

          6d7ddda2c9d4a407d7ddc60b1d6585b69f082e5c

          SHA256

          5140849ba3ffcbc0a51822fa25e15dcd54ffe390095d3845ee1aa47613e4e767

          SHA512

          f12085a2129b3fbddb741c605d9a535fe134a290c22d69268d8b960c50dcb7ecb96c88f99ebe685d2ee7a47e4126049eb25ba48b710f27f2275af40bb90d6124