Analysis

  • max time kernel
    120s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2024, 08:32

General

  • Target

    e50b917d4eb222e4e023d59c58b40610N.exe

  • Size

    65KB

  • MD5

    e50b917d4eb222e4e023d59c58b40610

  • SHA1

    2643f435a41259cd2647475ff1fa1b1d858bbe8b

  • SHA256

    b331aa0a41b5f80da59f82fa7b2c386a2c3bfccea93317f419a26ada70712c3a

  • SHA512

    0a458d9da258c9bf1d1b80249590ffd20593bd8b5c00419ea3ef4656fccd37772e164f6ce2be0afeb5108522558dcc51d9a393ef98f81adf8fe7459e6d6c6068

  • SSDEEP

    768:W7BlpppARFbhWJq5nosMosToFwA9J/iA9JDwA9J/iA9JJiuR9pi1xOR9pi1xz:W7ZppApF5noZo4o3iM9ko9kn

Score
9/10

Malware Config

Signatures

  • Renames multiple (432) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e50b917d4eb222e4e023d59c58b40610N.exe
    "C:\Users\Admin\AppData\Local\Temp\e50b917d4eb222e4e023d59c58b40610N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2440

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

          Filesize

          66KB

          MD5

          f15ed14d9299c7c6d1c31f0d0b6084e3

          SHA1

          674be3453077997f317ea01add8b801191a8e8ab

          SHA256

          d0c82995924780355c9a5b3e61d906a94f7e4ac195947d2e950caf6ee6237637

          SHA512

          9f31fa3cdf26e0b42d1b737349ae582920b4682baccdbe2fd77db6295e40e53ae8e09a499d54e403138e70131538928df0e04908192bf46fd367631c244f98c2

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          74KB

          MD5

          e97e909c8860f5b88930d872c201ab1e

          SHA1

          e66bd193b68ff3a9a13e7877e71bcf99cf7165c0

          SHA256

          dff81b77e6bf3f44e33052a726eb187c32da970500a976f386c4768d49910b5b

          SHA512

          f789730f1aa1bffdf856d5e3ea0839db9f2a736721d905d07ae9736a4a91cfc8e280a89f9c2f047a18b4e9729c0f52b42218b6c27abe0d0170063bce365d7342