Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    24-08-2024 05:47

General

  • Target

    ebcd3cb583c3b20ccffa7f78187cae6fb34efae6f06b02457271b93d713e95ed.exe

  • Size

    39KB

  • MD5

    889e67d871f9e500d728a627bf056ab6

  • SHA1

    021d087c06dcb0f6f84fe88e03bd87869be8c698

  • SHA256

    ebcd3cb583c3b20ccffa7f78187cae6fb34efae6f06b02457271b93d713e95ed

  • SHA512

    d76b89a14a9245b8d88a51403c4ff35fcd1d0ba56e60d201dcc4fda5e788b242f1c17604fd1701cb6025820a7087b25c394b8702ccef4290f6cc6f326b482db1

  • SSDEEP

    384:yBs7Br5xjL8AgA71Fbhv/Fzzwzscuc9lUFTlUFt:/7BlpQpARFbhNI6FuFt

Score
9/10

Malware Config

Signatures

  • Renames multiple (4015) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ebcd3cb583c3b20ccffa7f78187cae6fb34efae6f06b02457271b93d713e95ed.exe
    "C:\Users\Admin\AppData\Local\Temp\ebcd3cb583c3b20ccffa7f78187cae6fb34efae6f06b02457271b93d713e95ed.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    39KB

    MD5

    e71dc7a8e6ff1d687fa060668041b3ee

    SHA1

    1203410b8329e93bcd183914c7dbf9a19ddfa577

    SHA256

    fde0df0f00604e70d19492ea9677793be2d09f519cd700b0e0e3452e5028b44a

    SHA512

    24b5818b34eb5ac7b86a1d908dfcc948e26fb6c13b3ccffc9caddca53d8ea8a8cd2b8c67d21a7895355c7223e54e0e345442961925c4f84c01b6370cce11a1dd

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    48KB

    MD5

    d7d765c28866b3326d353c955d59a6e1

    SHA1

    7bfc968baaa965f22f5c70f51c29367d1f65bb15

    SHA256

    5ddf756bf14aa2d077318222bac21f655dc0c285df8c7ec8ecc32c38ff50ebae

    SHA512

    683eeaa45da7aaf2822f8b1d6004e419fb1e2b79ea388c4f3f15bed6def614dc31e306c6fe081deb9042b00aa917091a3f99295a8d39439eaf3863514671ef79

  • memory/2764-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2764-74-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB