Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11/09/2024, 03:49

General

  • Target

    e62e469530b17d18c42d5513605aeeb0bc4ac1e59caa48b3b455fc5ddf7905c7.exe

  • Size

    36KB

  • MD5

    47124f15f23927d3a836526b0f846174

  • SHA1

    e9752b8bd8b0e3e25259414d9c3dc4a28ebf3b57

  • SHA256

    e62e469530b17d18c42d5513605aeeb0bc4ac1e59caa48b3b455fc5ddf7905c7

  • SHA512

    d57db93a986d1f1d9665fc0ac25b7ca8f7b9cb735b5a5b387ee9d051dd76f6429e64a80df7de27f4575ae5e8f6986df8b7800ff218b817de8afebc34a42a75e4

  • SSDEEP

    384:yBs7Br5xjL8AgA71FbhvsIzaApAyJO3ApAyJOGiT:/7BlpQpARFbhxztpAyJ5pAyJ8

Score
9/10

Malware Config

Signatures

  • Renames multiple (3733) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e62e469530b17d18c42d5513605aeeb0bc4ac1e59caa48b3b455fc5ddf7905c7.exe
    "C:\Users\Admin\AppData\Local\Temp\e62e469530b17d18c42d5513605aeeb0bc4ac1e59caa48b3b455fc5ddf7905c7.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2116

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

          Filesize

          37KB

          MD5

          2332166b7874b7d5475ebc4394c0a10e

          SHA1

          12dc41d79ab0c98bc1271c4d17c914bef5141630

          SHA256

          6a03afde98ce49b0d15da828c5953450eb955f52b3fd33c8b3604c965c9315b1

          SHA512

          25a80784f9a8e337ee55930f22987704ad3462b1f7a68760c435172d0f849c1b6b2e1bf1ee41b649670f6adbf5c8455706a32a05416b3d703d8d1e0ab53d06f0

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          46KB

          MD5

          a2f54cefcfdc2e0508540db90db7dc0f

          SHA1

          f8081fbd9a7bbc6c8c7f1f7a97db818bd3146bb8

          SHA256

          7a1c23052177f8ece45b504aa339493321fc81f7b10653471ac9e9c651e53769

          SHA512

          e45d8c853c50f69fdf983a535c8a7ff47abcbff4433158d05181540de57ff914add59faf7246336d084c65e88a7c33c9028e216fc7c971f5a5184483de1de470

        • memory/2116-0-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/2116-68-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB