Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    14/08/2024, 04:00

General

  • Target

    4e0074d14aca260121314c260ef52bd0N.exe

  • Size

    54KB

  • MD5

    4e0074d14aca260121314c260ef52bd0

  • SHA1

    4bfc4206ed87f4e2d7825013dc55a312b8e5a7bb

  • SHA256

    acf5d3b72d08fb309ab9de11ca050d0b0629797ebf8a7ce207f18331e73fbee1

  • SHA512

    3a98f8d4603e3bbea4115872b852d1d80ce85ce36b0bd88ed20974d088cbb062e452caea3751fec42258dca2567b528461f477b7c75dcfef31bd8a9047c77dec

  • SSDEEP

    768:W7BlphA7pARFbhvOsTKnKqtkYi+nm5u5+:W7ZhA7pApvOsOKzso

Score
9/10

Malware Config

Signatures

  • Renames multiple (3366) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e0074d14aca260121314c260ef52bd0N.exe
    "C:\Users\Admin\AppData\Local\Temp\4e0074d14aca260121314c260ef52bd0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2480

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

          Filesize

          55KB

          MD5

          cde0ce740bc3c1a76d0446413751db58

          SHA1

          17c232dc51c9543768814c914ca6d589aec7edff

          SHA256

          1e532b5036a3e24fa2ce3e7edd1d3d85bb65ce818a1286f876f3380e08765d95

          SHA512

          80b31791665e1a218ebfb6031ff90c498f2a05854dddf9050fc59817e60ed1719eecf9560f9c53e7c3b26db934ab7ad811c3c76004251d09a1d7691724bc9468

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          63KB

          MD5

          63f25ae77ac2dc431fdbcf0cb1bd1fdb

          SHA1

          de21075250a8247d2a744780f1410ee8ed429a79

          SHA256

          3dd57cab0b31e3831590684ce2ec128846d678aad801c70db3eeb3c0358795bc

          SHA512

          9ca47d20da0b239dd6ef41f6dd0de6d890d7457513c5ca42163e5414c5c213531a27209dc8847ef6894a0295010da86e5e46f8b4a8586c9e4598101b74193e25