Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18-09-2024 09:10

General

  • Target

    e6ce1548be3959ca8d55269aa7b7ccd52d2b258ab389adc74c602125f165a8a2N.exe

  • Size

    43KB

  • MD5

    854e354f85ce92cc623c4de1c2239240

  • SHA1

    756c1b3f2cb9c3c84e1307c54561c630802dc4cd

  • SHA256

    e6ce1548be3959ca8d55269aa7b7ccd52d2b258ab389adc74c602125f165a8a2

  • SHA512

    93ccb3a9fedb6138673142f449d989b03bbea507f78dd206977a5d98fe68e7f5e795f66c79057ef1ac506f67add05c48e8548ca7144fd2fe54402f7eb9ff3d82

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfproFNF2B5dB5y:W7ZppApBULcfpHLcfpyD2jdjy

Score
9/10

Malware Config

Signatures

  • Renames multiple (3442) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e6ce1548be3959ca8d55269aa7b7ccd52d2b258ab389adc74c602125f165a8a2N.exe
    "C:\Users\Admin\AppData\Local\Temp\e6ce1548be3959ca8d55269aa7b7ccd52d2b258ab389adc74c602125f165a8a2N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini.tmp

    Filesize

    44KB

    MD5

    d49c8eed2ecbf17edbc3dc32a462ab19

    SHA1

    cbb376e700e8f7a563b67a1e405d87d7ec078b5a

    SHA256

    1c2f47578335b0299f130f4ad5683b3108eae0a3d14e19def9268c6c606bedd1

    SHA512

    5c1c93567dca0eef65f198b662358bf70238b2135d6f41ecacacc2fe6c4574cf05a3a6b7b8ae7161880b3170885c3f02cbab3320a5d307320b1eaf1ef9244cc4

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    53KB

    MD5

    61340f71e429c5fdc2028325d69d4807

    SHA1

    fbfbbee39884a9e26ad96c692badad7eb042e00d

    SHA256

    860305348d1032e5a5b947077e6e1fd03cc12cc2936e6353db885b6119e87041

    SHA512

    d122ec5c5652f9948c618cb12018f6f4ec8c12f53d19d9d0bc8f43d5deeb1fd9b88201d5c47c197b1fc7688813c57aff977d36f48c5e7c704cc8b55a07860d03