Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15-09-2024 10:16

General

  • Target

    4c0d709b713d4d430610187c72c950a0N.exe

  • Size

    44KB

  • MD5

    4c0d709b713d4d430610187c72c950a0

  • SHA1

    7c6f8ed93de08781d0483432125108397426ae5f

  • SHA256

    94cb4ecfbac97d6650b3550e3500548bfe9c16b6639bb87a05f729db41db7502

  • SHA512

    fbe81715e764fc3f409829e3fbba2d5cf13569505e7559018e91b13d42214f3b757080ebc56ac430c8f623de992e93d49dd51aa24c41ee0d701b23c2a4edf5f4

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42Lcfpb2N231F1ngig/:W7ZppApBULcfpHLcfpSo3f2x/

Score
9/10

Malware Config

Signatures

  • Renames multiple (3423) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c0d709b713d4d430610187c72c950a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\4c0d709b713d4d430610187c72c950a0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2436

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2872745919-2748461613-2989606286-1000\desktop.ini.tmp

    Filesize

    44KB

    MD5

    96ff036a231cb8988d120c28d721a04f

    SHA1

    ae6fa7009bd433f180661c32591cb1dd6962e08f

    SHA256

    692624713ee3f74981ec8e3b8ab2643063c0697fdb10069e61415bf02db7687f

    SHA512

    4027a0fb38148f12f57cc1c92c4b783a6bad159a22e1ada122067dc6ea6f5e03d5dfa2c573c7fa12346c3236d344d348eed58451004cabf5afa9f772b4fff803

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    53KB

    MD5

    b953ac29d273b8a82e1f44e55816e33a

    SHA1

    42da2e3d322c46d84fda99361852462f2b623ce6

    SHA256

    8d0f36bde86cb7def71fd5c4882c4cdb4fd34e3604a1672fc7292c17c29083cd

    SHA512

    2398f0e4d10265806e3af2307fa8248d6c1d4c2bde10bc5bf5eb75bfd95b3d4cb77ca6ec5a69bb16e0757480e70d83ce10661639d5917265d99e95b57a21099a