Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 02:54

General

  • Target

    e4e6833f5bb9d0377575e024cfff580e1d2fe5238c13b64add86eb914f3e6afc.exe

  • Size

    80KB

  • MD5

    494ca457d6494579067357b0f7b62b0b

  • SHA1

    f57c77beee309650e7422097ef2b63e266dd4b3f

  • SHA256

    e4e6833f5bb9d0377575e024cfff580e1d2fe5238c13b64add86eb914f3e6afc

  • SHA512

    67229168668df13cee1fc4e12eaed89075c2f4e79e55043c1ff7d1fc53aaf9accef4951707f2da5cf85c0af13d91145cd02ed03084a012479e3f6368a08eb2ff

  • SSDEEP

    1536:W7ZhA7pApMaxB4b0CYJ97lEVqNR7Yge+ejy0Wjy0WzYS:6e7WpMaxeb0CYJ97lEYNR73e+eGGh

Score
9/10

Malware Config

Signatures

  • Renames multiple (3511) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e4e6833f5bb9d0377575e024cfff580e1d2fe5238c13b64add86eb914f3e6afc.exe
    "C:\Users\Admin\AppData\Local\Temp\e4e6833f5bb9d0377575e024cfff580e1d2fe5238c13b64add86eb914f3e6afc.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    81KB

    MD5

    8e9cbc1e28dc37fb3d4057e95579b99f

    SHA1

    da44c1c214b5db552a7c76969e77a0c440451cca

    SHA256

    b861e2c3192f2f1de0072217f60000526d0ed54b0a2aec03383a6475d6ed1abd

    SHA512

    d48e33807b86189a8449e2dc5d6944c128674a7be85106affc69d51f876f1d6b15259725851f937112478b4af7c77ced3b6a91ea746ab38ef950f30c45f632f9

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    89KB

    MD5

    e7823e594b5634f563cd25111bc0c50e

    SHA1

    529023510e516687a880bd46c89c13844982a09b

    SHA256

    fa91a90bb176f24b42bb983bcce1866b3ba13f41345dc06c497b01f8c8162528

    SHA512

    038ec3db301585e981ce3ad2c905122dcd5e40f8e746d4810239f58d81583863dbdc64762c883a59abbca512af7808085789fe741ee1178b7e7ec5294efea2c6