Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    04/09/2024, 01:40

General

  • Target

    4061bd4cf39c45fe7a5ed7b73753f260N.exe

  • Size

    43KB

  • MD5

    4061bd4cf39c45fe7a5ed7b73753f260

  • SHA1

    bc041f5934587c69c95687cdeecfe537715b484a

  • SHA256

    941eabbc8105fdb6bb86e412293e105339f3e91948b9e76879bdaaf40c18d2ff

  • SHA512

    fa302a60376edd523bf216969170f6acf15c76505a3df4ef33296244df145226d408baee61cd9f73469980b0c998f72e32c10e4444b24b8481123b26f78cdd75

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LOl6Sl5lsSDjV:W7ZhA7pApM21LOA1LOl6vSDjV

Score
9/10

Malware Config

Signatures

  • Renames multiple (3263) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4061bd4cf39c45fe7a5ed7b73753f260N.exe
    "C:\Users\Admin\AppData\Local\Temp\4061bd4cf39c45fe7a5ed7b73753f260N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1300

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    43KB

    MD5

    df8f2897ce1af6d56456179b3d527013

    SHA1

    e5d676c3ddfb41136ca73d70e8188ad2b649c943

    SHA256

    36aa58a1fa9d17ecb4bf5307fec0cd282ea62758a153b350d4bb2ddd832393cc

    SHA512

    57351e57c00b412f606f20c8f9e288c1bafe36e5ae6aabb528f7c68da19b03a71120cc9a56335bfbe1d6a5d8439263135b20394b87704d117e0b1a6c7c29326b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    52KB

    MD5

    f58b6343e7ee0053cb39377bfca816d0

    SHA1

    d3402973df11dd1d7232a7f89522e600e66ea51d

    SHA256

    306f8d0bd7f8d42f15165aa62bb17d73d356a94879cd6b934fca92bfe71374dc

    SHA512

    5f4d6512adfe8c53c2c7ff074e2576bba5e15da1baed159aeafb3f7022416b71607580ae2b2295874b18de277876673d390e80b8ca460b8778850733df6f942b