Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20-08-2024 03:22

General

  • Target

    7e9c45fd18fbdf713f56cedf76d0a140N.exe

  • Size

    54KB

  • MD5

    7e9c45fd18fbdf713f56cedf76d0a140

  • SHA1

    d3b5d25502a11a5e3b274a3bf7183da830c12720

  • SHA256

    d6da777d4c9cb818463aa84d656a1a7c5bd0259128df101b8ead739e4033dc40

  • SHA512

    4a17798c75868d8056031b6f3b2249966940e71e0bd90d62603427d0082f0fee7cca57bfae4b6c9bd43a3e1d11cf29f7bfd2fd09a8b28009563302a8511766e9

  • SSDEEP

    768:W7BlpppARFbhwEnAAJ+AAJbjyjuhPitvt+:W7ZppApwEgyaPitvt+

Score
9/10

Malware Config

Signatures

  • Renames multiple (3317) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e9c45fd18fbdf713f56cedf76d0a140N.exe
    "C:\Users\Admin\AppData\Local\Temp\7e9c45fd18fbdf713f56cedf76d0a140N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini.tmp

    Filesize

    54KB

    MD5

    4c100851d23864e0ec21c45dae869943

    SHA1

    96251bc3a22ac1b881e57b5d2d55a1b71cff0266

    SHA256

    c4fda9df9c5e9a77a4244f5567f7a6571d10517b0707fd879af3b9b45d57395c

    SHA512

    2fb4ed18b1b39ef2dfa33493e9689fee6275485e5b1ee30042b4e1c0ae49cf23dbffc4dbd0a6321e05277ab7b49bb1e39d85c284154bb422867d75dbc91424ea

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    63KB

    MD5

    cae8539e1e18230900dcdfdbae6518f2

    SHA1

    cd541a0dcb528537537367ba7632f510a8cdc58a

    SHA256

    46d07a45983f9c99ff8d3430685b603f8d9ebfe11a9f95475fa9ca13aa310dc7

    SHA512

    54acbd6e958d82ddd7be1e3206936f4aaf7a05875053fc0ab783de1f7c3ce74484cd8e8ff31b815813e56983eab5d4358ec0d0069d8e2b5e5b69252372e050b1