Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    24/08/2024, 20:48

General

  • Target

    ced5b30cf7d82d04d9017e95b8edb6b0N.exe

  • Size

    98KB

  • MD5

    ced5b30cf7d82d04d9017e95b8edb6b0

  • SHA1

    14fe72778e46a5e535473a69c355cbe21dda8285

  • SHA256

    117f076b3752720a41fea9c2e32b0da98c90e857527afd33e57ecdb3f6f696ca

  • SHA512

    f1a047517412472f08bd61b20070464820ea5f3e0aad52d5ecb64c8972f80747f214bfd82e11574c32e206c41ccf9274169a0fb0a428f8cef9aea890bffc5296

  • SSDEEP

    3072:6e7WpMaxeb0CYJ97lEYNR73e+eKZOf7fB:RqKvb0CYJ973e+eKZOf7fB

Score
9/10

Malware Config

Signatures

  • Renames multiple (2922) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ced5b30cf7d82d04d9017e95b8edb6b0N.exe
    "C:\Users\Admin\AppData\Local\Temp\ced5b30cf7d82d04d9017e95b8edb6b0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2104

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

          Filesize

          98KB

          MD5

          a13ddcfe24abcce96befce62148f5c56

          SHA1

          c8a71e601bf68c35088e11fe1fbe409939828440

          SHA256

          04a5142d924f944da25ba04a097a1f06fe5660f10aecbc87b71a060062c3652e

          SHA512

          33ced72af5b762e1561a6253265da869878d06f23c25eeae82518b83b758d3493ae2b305b9a384997b77f46991654fa49161acd3d4423ec7afa39b0eedc44ddb

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          107KB

          MD5

          29c1ab7c972963a072ec66263e318a0d

          SHA1

          50ce21ce10f021914369a86cc4901d2ff99427b0

          SHA256

          d1a4aaa2cef6cda2ea208bf3179487c7516dee79705e8b2f8e779bff0a14f7d4

          SHA512

          a98fa482178cdfd2d45a1867ee051733caaae327f688184369ebb2f29ae8427c6b044d2e51cfcb44557d047083b07fd99dd3e001dbaf24ca3b51667fa936704e