Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    17-08-2024 22:26

General

  • Target

    4d18444a4ba422403bd973bb406ebe90N.exe

  • Size

    102KB

  • MD5

    4d18444a4ba422403bd973bb406ebe90

  • SHA1

    260e36779ef4bb44fed714ad3a0c0872f50d60d9

  • SHA256

    afd0448a740e3d7a03fc35e81955930f264ac38f33c9e4ff12b12cf8609e41a4

  • SHA512

    24f289a405b48e170c08d292bd41e3f402850b9b1052bdc5599f82cc832814b558b39524b53127122c503c94637bffe4282d3fabe2f099b5f112b03e8a7f9755

  • SSDEEP

    1536:W7ZDpApYbWjIlE77ufL2e+efZwZQ/8S/80PqPIUpCUpiP6:6DWpwE7oL2e+efZwZ08i87

Score
9/10

Malware Config

Signatures

  • Renames multiple (2882) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d18444a4ba422403bd973bb406ebe90N.exe
    "C:\Users\Admin\AppData\Local\Temp\4d18444a4ba422403bd973bb406ebe90N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    102KB

    MD5

    7359d6d8f1804a364f94042ae7fa00e9

    SHA1

    3b25d2c2ed72bcbaafa412e5ae526276dc5064a8

    SHA256

    a1daf76e8110bcf023553c8c61ced6633575a42b7d508b41430a6ba7d2386fd0

    SHA512

    b3ef818d6ee49c903ddae64d09cad940ab8c4f75fe3cc7674a03ea1e9a5ec2117e3f1289d88fe65b166b5e5841414993744556296bb2f2799a3e9e965dc48f55

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    111KB

    MD5

    5c00b1881483e12729f63730601fbc22

    SHA1

    10805629556353183dbff05a58b478d3c8e3b53b

    SHA256

    4b79c805ab2bb1d2d6c6572692a8f27c865174bf8bb16095e65de697cdd802a6

    SHA512

    2c4ca6d1bc0fc2871463ea6b5da1c4625de4b2077cd90d3a512ad416dea0697d7ac76ae3f65911e514378d9c947a83420dc41149be1b8310d1ecd43cf79f1be7