Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18-09-2024 08:59

General

  • Target

    e52a4d134fc04e5d9a13363e26258e1450b846f067012a786967a0011a36b13dN.exe

  • Size

    89KB

  • MD5

    28d57199e8753ba74a5e7056cb5eac90

  • SHA1

    61129701d12a4c2b5b3bcdcb328242b5bae44836

  • SHA256

    e52a4d134fc04e5d9a13363e26258e1450b846f067012a786967a0011a36b13d

  • SHA512

    9125a5e82a4cc1a572c69af421e579c74692be66020d731fe7c1f66b3d4b166066e49d05976983792084f2355ff16decf8d2ccd8dd4f47ea6053e4a2ddb45c6a

  • SSDEEP

    768:W7BlphA7dASbSjJJ1EXBwzEXBwdcMcwBcCBcw/tio/tivBT37CPKKdJJ1EXBwzEq:W7ZhA7dABJJ7TTQoQJTW7JJ7TTQoQY

Score
9/10

Malware Config

Signatures

  • Renames multiple (3180) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e52a4d134fc04e5d9a13363e26258e1450b846f067012a786967a0011a36b13dN.exe
    "C:\Users\Admin\AppData\Local\Temp\e52a4d134fc04e5d9a13363e26258e1450b846f067012a786967a0011a36b13dN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2872745919-2748461613-2989606286-1000\desktop.ini.tmp

    Filesize

    89KB

    MD5

    1515b865f8c9bf2f7fbc53233d591c88

    SHA1

    679fa65be667d816d96a8019b485702be31b30e3

    SHA256

    883fa997645ac4ae6c13bff2a1f5d1baf1ed77a45261f6561454662de82163d5

    SHA512

    e4791e9a0751ee7e11a581a641a4756b18396a6e97cc76253be7bc2bb128deb03b7b4dbb1da00647f75bb978b2d96eb5d0b07909d78b7189fe215b5dc7aa9c67

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    98KB

    MD5

    382a619410d8ade754126ca6a1dce2d2

    SHA1

    6bc52a877c46a8ac3b333c9ce2327e35810ef431

    SHA256

    56a8bb1462e3e64c8b5904003c9df0548f761c10a39bddcc556f71a703942303

    SHA512

    7014350e9b4fa738f33979f44f47d79d66a10c3adc5757f7586643ebc402611d52da5838f5d44830c2e5089720bca22e716b217ba98ada1b8e7a60c9468e8d47