Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    24/08/2024, 04:24

General

  • Target

    e1bc7daf42bc76ced16fe6cac9945d90N.exe

  • Size

    93KB

  • MD5

    e1bc7daf42bc76ced16fe6cac9945d90

  • SHA1

    b30f5ac1d769ecb2f8e6d027fe05d1a97bf5dccd

  • SHA256

    fdf230fe674af1b3704272e98bea3c824ea6f93bf2bfbc7e957b76b3e8e4df44

  • SHA512

    662c5fb4e2445e87ca267ef8b1771c9b750f11f95699431332b21103b93e97d70c0eb908723a7589a3bd3119c99fcce71e749e10ca58ce24a52b9d90904b0df4

  • SSDEEP

    1536:W7Z9pApQESOHepOHe8G+6E65dyGdykNdNBKggH:69WpQE0zxgH

Score
9/10

Malware Config

Signatures

  • Renames multiple (3147) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e1bc7daf42bc76ced16fe6cac9945d90N.exe
    "C:\Users\Admin\AppData\Local\Temp\e1bc7daf42bc76ced16fe6cac9945d90N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2372

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

          Filesize

          93KB

          MD5

          4cc79983d5efebebc86b8f4caf397c9b

          SHA1

          d7d80da95540ca8d2c6aac5e4017eb27668802df

          SHA256

          e6c7102f4dc3104965e85868fa226af15bb45e961b1ded88876eefc1cbf00f52

          SHA512

          18aedfe149ba147051f194d7b7c4d0cfdaffd0942145e450d28bd5104e58c0ca369329f57c6c275c45ae64541f5ff7b98336b7d4093efafbb989d0080027073b

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          102KB

          MD5

          00e5b0ec03bdc0f474fe0d6388469790

          SHA1

          3e94893c68d880b53f35f280df0138f8da15bf9d

          SHA256

          15d5e676d463923800a7d8da3f8f7ae01f925242dbbdea89dfb0c826ac59ee58

          SHA512

          549b9c2102398e67c79f3ee7120eda115ec3b47ca7e2f59516d4a46e4972f3cf498ba9be9db2442fe50bb31de84a1005534d5e714615892aad2db8f72c026bf8