Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 03:09

General

  • Target

    4c13acb3ec0b5f52eeb1781b442a56b3f555301ffea77414cc76f68ecdbad28dN.exe

  • Size

    44KB

  • MD5

    e97670b8d1bdfec0fb04bdbd4eb0da50

  • SHA1

    629e56d4fef0864ac415e21645129cdc0fd2c950

  • SHA256

    4c13acb3ec0b5f52eeb1781b442a56b3f555301ffea77414cc76f68ecdbad28d

  • SHA512

    2a5b3577562d1647eb237dda9848716070ae74124eae2faf0a25b7f863c994093ad6b3ece9a96e343c96bf4cc34cbfb7e797d35f51240574a24614f5a524c339

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfproFNFjqAJLOqAJLNdyGdyhe2eB:W7ZppApBULcfpHLcfpyDUdyGdys

Score
9/10

Malware Config

Signatures

  • Renames multiple (3230) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c13acb3ec0b5f52eeb1781b442a56b3f555301ffea77414cc76f68ecdbad28dN.exe
    "C:\Users\Admin\AppData\Local\Temp\4c13acb3ec0b5f52eeb1781b442a56b3f555301ffea77414cc76f68ecdbad28dN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2980

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini.tmp

    Filesize

    45KB

    MD5

    084d5727ed662c0f6fe69306f8bdcd59

    SHA1

    cdd3e6bbf9f418ccfb8a1a7f2171e93ed77c6eb6

    SHA256

    b59a00bcec129403574fb617b75fdb7d95bc7a2b836cda9fa1ae38673e099fdd

    SHA512

    b5813a1ec5d206a5d0cf5b2222946fac0e3866a81f7ec1b291280e87c942c4df9f36a60bcced47bc010dde9e6a9981dbb4693cbdc5eccb01338edeaebc5dc9d6

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    53KB

    MD5

    c7169d4b34af5e4bc2cf8df7b9d94e97

    SHA1

    9df83677e88dc42b845cd63eb8217bce7345ec23

    SHA256

    dfbfa7f4a3fc320af48b6a4eb99f1adbc761a4e720757b2e037880a910257627

    SHA512

    e2f243d45234cba269ed2356dc3e51454269d216fd8678f565533db04d0aa3359cb19a236db63816ea1c711921a2ddbd46c93b9b1a806647a0826ae365c5b25f