Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 04:27

General

  • Target

    ed880631e82fba13a8cff968cd177708dcd3ddbe9e315a7d7440eb9c7ac8be8bN.exe

  • Size

    46KB

  • MD5

    42d8eff302dbc8358feb4d787a19bf10

  • SHA1

    13a11a84b2dc6261ab0bf10c792b81cd0ee3426f

  • SHA256

    ed880631e82fba13a8cff968cd177708dcd3ddbe9e315a7d7440eb9c7ac8be8b

  • SHA512

    41495dac38a6c545cb98fb86835ab66e32fd6a06054189354f105ee0db487e336553b2d575a0ce764707a375270001787d769b5a154f738de69f58be06022f79

  • SSDEEP

    384:yBs7Br5xjL8AgA71FbhvBfepj3cfepj3KtLJilqGelqG4K66CPK66Cux:/7BlpQpARFbhq1KtGFGxNCSNC4

Score
9/10

Malware Config

Signatures

  • Renames multiple (3249) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed880631e82fba13a8cff968cd177708dcd3ddbe9e315a7d7440eb9c7ac8be8bN.exe
    "C:\Users\Admin\AppData\Local\Temp\ed880631e82fba13a8cff968cd177708dcd3ddbe9e315a7d7440eb9c7ac8be8bN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2296

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-312935884-697965778-3955649944-1000\desktop.ini.tmp

    Filesize

    46KB

    MD5

    61a043017207efb4ae11e821b0a0382b

    SHA1

    7f218f728626ba9b03cdb710d8a7af46aef0dae0

    SHA256

    dd16731a3d39154042bcd988153e732633567049205103c9f741a55e2a21af50

    SHA512

    45eded3b54292e1e81ebf55d5d74931eff2f50349351953d65523af889cfd1b365706c966c31bc710639484802ed7de72cb2e5823a99de3b7b8c28c1711db05d

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    55KB

    MD5

    5d4f0700b79c57e877397cb4f18fd42f

    SHA1

    36f8e846374d95603882752f6a49f52c9fc18aab

    SHA256

    ef880045fb5f8d1a304d9dddc1135166a40b4601b7dbf322f4fc5dd17ffc3b38

    SHA512

    27f4f85d670eef8f57b07aef47c7a75f85d272798d2fddb717d492ca2431ed957a7dd9f51499eb7ee395873412911c6128397821d24d3a9065019aad37955cdf

  • memory/2296-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2296-74-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB