Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 04:09

General

  • Target

    e1f945acfd77e1215ef73f2cdda0bc3b0eab44176606db727308ebb944642e60N.exe

  • Size

    61KB

  • MD5

    6a3884c34d43271b0e7f06ce15961970

  • SHA1

    513480bb4e813e4ec6603731b0b6a9951cd99c04

  • SHA256

    e1f945acfd77e1215ef73f2cdda0bc3b0eab44176606db727308ebb944642e60

  • SHA512

    d1453f11dbaafc8584d67dc8c169bfd2af5428612f64888c064846d30304310891b320154b0ca631f8828cc8e58cdd83da8ce6b1ac0d2f736931fce86bbb0396

  • SSDEEP

    768:W7BlphA7dASbSjJJ1EXBwzEXBwdcMcwBcCBcw/tio/tiBhRK7:W7ZhA7dABJJ7TTQoQNK7

Score
9/10

Malware Config

Signatures

  • Renames multiple (3315) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e1f945acfd77e1215ef73f2cdda0bc3b0eab44176606db727308ebb944642e60N.exe
    "C:\Users\Admin\AppData\Local\Temp\e1f945acfd77e1215ef73f2cdda0bc3b0eab44176606db727308ebb944642e60N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1444

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    61KB

    MD5

    b9547ca3f45581f05cc0b565cd19c195

    SHA1

    91a5ac31e060257f781c9e94f0b24d87a867eb3d

    SHA256

    9e47ce36694037a93db1213030fa629e132cd5696b9a280d622443f897207bf4

    SHA512

    4f5f6fa91edf74a120c4005130924867c56f9117eda6e737ae281e3c910f3a4742afb2a5a7c71cc45c4e436126ea2107bf3b8f838fd1eba1747dfbde2044a7c1

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    70KB

    MD5

    a3f74d1bd10e2f1bce908ac99a347dce

    SHA1

    4801207945bc2adc814f865926a3e329df657c01

    SHA256

    af0bc22802c26dfa0ed5b8b6c6883a286d8ce45bf7d643ed27780e4f4f756c6e

    SHA512

    5ed9432bf3f6525790ac7bfff2a66fcaa6de5b74ad8b521854f19dcea835fba38413f10d9845f23e5551cf694e9c3b3efa24441b03c76800ccf82dd98c44bfe8