Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14/09/2024, 05:05

General

  • Target

    ed2b26846caaacbc5dcb1453251e0240N.exe

  • Size

    62KB

  • MD5

    ed2b26846caaacbc5dcb1453251e0240

  • SHA1

    9de4c1e0c30e7b44dfd72ffbc3b59eb96a4cecc1

  • SHA256

    5febdaab80d6a1dd88a1e7b2017b5952ef43a85913346f9d848df92a0ed769d9

  • SHA512

    e0c89a3d53517d07ce47928c401c42ce5e01d85218b290184d12858d373524ee38126e09adb76a7c6f41a6ab1fcc362220866fbd8a2e53159ff4d25013b1eb22

  • SSDEEP

    768:W7BlpppARFbhHFoqAJwBqAJw70EXBwzEXBwOvEJcvEJFTBEji:W7ZppApqvZvITB1

Score
9/10

Malware Config

Signatures

  • Renames multiple (3159) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed2b26846caaacbc5dcb1453251e0240N.exe
    "C:\Users\Admin\AppData\Local\Temp\ed2b26846caaacbc5dcb1453251e0240N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2340

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3533259084-2542256011-65585152-1000\desktop.ini.tmp

          Filesize

          62KB

          MD5

          5eb7d8dd7daed6f586d90243354fcfce

          SHA1

          ebd24ae95d85560de79891fc63e448b9483c30c8

          SHA256

          2cf22a8e8d82037ef9d396ff02210e4a9021f32939cacab5c3931eb2c34fd866

          SHA512

          7a02ab662862eb4841bf23fdb792b62dc7786a1a6cd3e422d9db5c75707c9da41a1e9891b8ea1920bdd5ae19474dc0f6bf6456eaae91c1a30532d6571e878d4c

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          71KB

          MD5

          c7609cc017b80a31a6ed66e5b4329b4c

          SHA1

          198b36cae820a54c8e4fc9214479a7944672bf61

          SHA256

          e452aff894e86ff89ff1db27de47fa9cea73f8c66543f22080c4e7663d0bce62

          SHA512

          88f1e633dd6598583bb26cc9bd8cdf127fdd38017e42a4a5b7f799fdf64991ed49dd142dca31bcc5790672c2b68116216adcf172f04a55fab790d6a823dc4a69