Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 04:55

General

  • Target

    ed8a07c6543f51993c28fcbc5c28da365b1518d333dfdc6224134fc9c74ed3e5N.exe

  • Size

    38KB

  • MD5

    b2fad0fe8b0cb6628c6109e1c38f7270

  • SHA1

    d99c978057c98a55355b9682e76e6bfe951e19cc

  • SHA256

    ed8a07c6543f51993c28fcbc5c28da365b1518d333dfdc6224134fc9c74ed3e5

  • SHA512

    4a1160cc135a8a047e53795d5b10e35e77018b65d4535686ff39987b311147c7faa1093169704db842dda3f8bea2258a66b9d996a86d4fd987243d7e96bbf267

  • SSDEEP

    768:W7BlpppARFbhjbhPKueKudLw1RntnaJtLJtr:W7ZppApB7PtaJtLJtr

Score
9/10

Malware Config

Signatures

  • Renames multiple (3375) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed8a07c6543f51993c28fcbc5c28da365b1518d333dfdc6224134fc9c74ed3e5N.exe
    "C:\Users\Admin\AppData\Local\Temp\ed8a07c6543f51993c28fcbc5c28da365b1518d333dfdc6224134fc9c74ed3e5N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    39KB

    MD5

    57abfde193e9e77df24c6a2b364c69e7

    SHA1

    df037bc6b6640d77b38e73a34fb0fb1b6811640d

    SHA256

    8e91fcbf674a4d7643bd2d561bb850fcfe93ba9c1a7aefc4009092e1d91e20d3

    SHA512

    b4c237c0afbdf91960d344f94e71e6ada2dc8cefce071a290dfbe0ceaf061f3a9b017c72c7d6521d3d77127b0e9f58c9ee87babb4a29824baf730d6fbe6f32b6

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    48KB

    MD5

    36087d45c9238c67e358e54a337b7d47

    SHA1

    16ba200dcf61f61003bafcf1913a4d67ea86feec

    SHA256

    ab420bd50f6b70277f35d01e3a7243c8979ae778ab988721c4a980d739f14f85

    SHA512

    7aab250b13e4df381f7f7490740dd76791d6787b373037ed4efe73f8e6fc7fbd9b4aac6bc7be32a7dee570131dd3db6b65d501c970e1431760eb8b1e1528a39d