Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    05-09-2024 12:17

General

  • Target

    04977d8f002efe5bd41927712007b650N.exe

  • Size

    48KB

  • MD5

    04977d8f002efe5bd41927712007b650

  • SHA1

    b265ec2f4d314bb96ef75df169fcecab85ad9e94

  • SHA256

    ce195ced486637b9c058fbf1a8ccdf3189849d556c6c0ee6319629e211accc90

  • SHA512

    4c72d5d95439211b7b387cbf5ab39cf92af10dd7e733764f3c439c434e0c1507c7a8b1fc482ac77f7328d48f4d3bd595295e7b31301d8bf08844ec6d1238ac66

  • SSDEEP

    1536:W7ZppApBULcfpHLcfpyDDnTxASYnTxASshJ6X:6pWpBwchcwDDnTxASYnTxASN

Score
9/10

Malware Config

Signatures

  • Renames multiple (3168) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\04977d8f002efe5bd41927712007b650N.exe
    "C:\Users\Admin\AppData\Local\Temp\04977d8f002efe5bd41927712007b650N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    48KB

    MD5

    92a5f7ed167ea4597bb923921395a7a2

    SHA1

    ce7e00da2e13c7418fda9a93dfa2a2c73c8852f5

    SHA256

    bb069fa6b124628aff3fa0ac261f107c3d09c962120b2c3c5a25b17963fbf5bc

    SHA512

    2a0885b0be2a689f4068ba0d4d293ed01e75c0ba3ceb8aa35650750e729b0a6eee7845f283053ad8a422117aa4c8f21b1c0ab580e65fc93b15289efae5cfe6be

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    57KB

    MD5

    ee9d2a417daa5f60756ed4503d35b90f

    SHA1

    17a78154634406b70245608bfd87b642d56827f9

    SHA256

    5a4f42f1748c62e03f81a4ab37d23c943573fe23e5950424083f25cd6414b1ad

    SHA512

    dc4446f17f2caf13041ab4b8773bda6dd9212c59b93b9a61cdb1331b3ce4a1af65caf370c0fda63fb3d21e5e67da78f6dd5dec3da162fad4e22ba8a2178adafe