Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    14/08/2024, 01:02

General

  • Target

    4dc0ceeedbe8435d3eba58eaff44d5f0N.exe

  • Size

    46KB

  • MD5

    4dc0ceeedbe8435d3eba58eaff44d5f0

  • SHA1

    62560f8f71dd109b5e69d7f400e1ff34c39f88c2

  • SHA256

    e72f0bde01e5720b690657e7eb381ac688f2c272435ee72c00e3ab2e65ba464e

  • SHA512

    afa215a4eed98cbcc2a85c351b0b54f086e9e6901c080f7973034a5e5354b35ff979f747759726acbf6d2e9741d88bc6cda8970cfbdbdebbc6e329745e4931c6

  • SSDEEP

    768:W7BlphA7pARFbhL801VvM801VvcR2+lJtZ2+lJtSs6:W7ZhA7pApw03vR03vcltdtSs6

Score
9/10

Malware Config

Signatures

  • Renames multiple (3291) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4dc0ceeedbe8435d3eba58eaff44d5f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\4dc0ceeedbe8435d3eba58eaff44d5f0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2232

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

          Filesize

          46KB

          MD5

          11a6ddf008a8bb665407f9da046ea37a

          SHA1

          f26d97a411d3fbe73330e132dc63983c5223589a

          SHA256

          26bb33649a9566f8b04c4b29917392741508f849b5ecc2cc44631460cb84b9e4

          SHA512

          259b605056a0e3c75b68f03c7fc0485d36141776d14fa031e06b2bcdbab93d1690f1e59d143f52c815b3253594f7b7c40e44818dbf7834f14f190b7cfd3559e2

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          55KB

          MD5

          98cbc5d1bf9aa1654567ea1430d68490

          SHA1

          d45fa3d3b85329c035d5bd9b64fa6eff0a21988e

          SHA256

          ff3e5dfba8a77ea23d60cf2daa84076b32d8995b975a7830312033cb8cec41bd

          SHA512

          ece1deaa4fcfbaad6b149bd2549111b5eff1038c06202563dd2c23168b6044c1b43a8889232b1c352b41120dba17e3959aa619f6d7b72c25a7fb528269e1c49a