Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 20:19

General

  • Target

    e628e6ed749476353d46e2d69c755950N.exe

  • Size

    47KB

  • MD5

    e628e6ed749476353d46e2d69c755950

  • SHA1

    7ab808950645497822155f8c57b10c01c5fe5abe

  • SHA256

    4529298ce3abb557ec1572a2a73e1bc74df0099bc7d144c3119b7038f288f295

  • SHA512

    4fc304c8bd534fbcdcbddf8384cb9deb697267828776a89e06116d1ab97077ce499ae20d4c78c7bc9d6f9cf847779c1a064b79d7e9fb9ff268d274ec657b702d

  • SSDEEP

    384:GBt7Br5xjL9A7AgA71Fbhvnqj7jU7ubTAgpbuvx10AaIdKB7ubTAgpbuvx10AaIH:W7BlphA7pARFbhL801VvM801Vvv7GqSC

Score
9/10

Malware Config

Signatures

  • Renames multiple (3417) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e628e6ed749476353d46e2d69c755950N.exe
    "C:\Users\Admin\AppData\Local\Temp\e628e6ed749476353d46e2d69c755950N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2292

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    48KB

    MD5

    29349cac0c3e61e7633609233d449be0

    SHA1

    ee9c9cafc4048d9e6c985193606a5c254150b9ed

    SHA256

    47e59f372878d624093f764ad7a46061640fdfdfb91d90c5f18318611c331786

    SHA512

    21174d49b936c181e4a187e2c698dbfe3d0b24b92fddc930d7053fa5bc018aff6acd3bac6efc44eb6e85e4d7460a71600c2c19bffd36d6e3359071e311785a4d

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    57KB

    MD5

    683a5c7de82d5a746407fab9fe523ceb

    SHA1

    a3b26feffb1ebe08810024009c7af2722a1c9395

    SHA256

    4d6643fac625c97719c6f39845058bad7b633a234ddff5cef6791eafc2638c7c

    SHA512

    0bbb482511510d73de4373ff4139d305e584faa61ae51e454ca9d5073f1c2bcb83c6dd4187f6aa11bb95f7be779cced62cd2853d5c81539eb1102bc48e802fb8