Analysis

  • max time kernel
    119s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    03-09-2024 02:25

General

  • Target

    4973978199dd0533f64437563b2558c0N.exe

  • Size

    49KB

  • MD5

    4973978199dd0533f64437563b2558c0

  • SHA1

    0117c7f6185e31640e29139d742defee63e54656

  • SHA256

    b64255f2032d2a5ee50cb1b280094b058554dc1e3a7d66ac1804d2f54d3c2b3d

  • SHA512

    d0c0fba1296d3441674afd953a2863af22001feb688131f4d890c825936265f64163bb20cca9479f5ced97e0ecda531fee4641e1dde0ca0491cbd227ef2e52e4

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfproFNFcdyGdyQ:W7ZppApBULcfpHLcfpyDcdyGdyQ

Score
9/10

Malware Config

Signatures

  • Renames multiple (3256) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4973978199dd0533f64437563b2558c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\4973978199dd0533f64437563b2558c0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2257386474-3982792636-3902186748-1000\desktop.ini.tmp

    Filesize

    49KB

    MD5

    4d5198cd3c40c33d2654410d7e1ebaaf

    SHA1

    d661230659c2cf2c6ab9a76c97a3091fe9fe1a6d

    SHA256

    d5148fef8abfc65be671fb8a3a611e0f488a99fe3ccb30ed77895983075215f3

    SHA512

    a68bf5eca6dc437c2cc82204665679e296a3de0521e66dbe4f34c7855fa1c3890fbf77264ae4eb8d4516318eb2508ab6eb2f6db877c03adf490d1582f74f703f

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    58KB

    MD5

    45ab3422877ff5d340769369e8a7e8c2

    SHA1

    7e657531946fdb3d07102e7a180b9281fed9f98e

    SHA256

    eb53ac6dc45e2bfcecf64132800ae0ddeb0ed5f1ff9127993a7545b0ff8f2497

    SHA512

    e8b5475590485e01c49f8d2e6196afb6f67fe380b2ba92561a2830e9f076b40ce7f7b0d897b67b04b6243b4a6140506b6160463dd84212d032873242f215f878