Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    28-08-2024 21:41

General

  • Target

    f4c0b74aa5ab654b3472615de5df1d10N.exe

  • Size

    46KB

  • MD5

    f4c0b74aa5ab654b3472615de5df1d10

  • SHA1

    b43ac39c816b2ca56608824daadb6a212ac5b2f0

  • SHA256

    926e5a0c629899225113fe3f481743fd3abf224184b83e9f7fedcc3014013485

  • SHA512

    98bf5affacae8a2b8d8a4eec679d54baa35f73105cf23541aec7c9287cd3f41d3490ea30a0a9da575fc2083c08c4628303b34dd019f169ffe8d1f2f80454067e

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42Lcfpb2N231F1FfcfX:W7ZppApBULcfpHLcfpSo3fXfcfX

Score
9/10

Malware Config

Signatures

  • Renames multiple (3272) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f4c0b74aa5ab654b3472615de5df1d10N.exe
    "C:\Users\Admin\AppData\Local\Temp\f4c0b74aa5ab654b3472615de5df1d10N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3040

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    47KB

    MD5

    eda5bb935b94697356e8dbf912dfb2fe

    SHA1

    e40d72c3b641f4234fc00889278ea7223800c1e1

    SHA256

    e73d231dad64e7373313679fa0b728bf05781917e9f4470a8e9579267092163c

    SHA512

    114b8436f36019305d0d1f3b302bee75532a0bed08ad59428a48fdce4171f8c4084fb132db8122603bac0a615b7e1d0e18bf74aac25184c4462e0d6c858fb131

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    56KB

    MD5

    5468e5fc6d53adc1bf35d47fceb5581a

    SHA1

    c2f9172c64c13cf355374fe476ac9402503125b5

    SHA256

    9382e864932f44d8f80ff8e9a94b0951a635a6f1aeea1c947d7b5febfdee1076

    SHA512

    cfbe51b64a7ba5590d4ea89fede3e5adee85881cbb5abe020d053654d9edf92b8b0753154aaef6aa1c92c74a4cb4fa8330d1b20bea61a887bf20d0182e2391c6