Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:39

General

  • Target

    497ea416cc84806b8ecbe1e8221c7789df8ac1757b9fd3a35d5f5a264354ed2cN.exe

  • Size

    47KB

  • MD5

    ee810c2d14e67bea1bea5c319a683640

  • SHA1

    0ff7f0ec625af1c46139cc0203166dec03a62673

  • SHA256

    497ea416cc84806b8ecbe1e8221c7789df8ac1757b9fd3a35d5f5a264354ed2c

  • SHA512

    b46f058747304fd485644e11fca4cae0638d58fac09bfdb0c763869df410880f9861f2ad83ddf4524d88cca3c84defe52bf2d2d758caabd45625aac9efdeff50

  • SSDEEP

    384:GBt7Br5xjLdbAAgA71FbhvU8g0U0fL+8t8YwTZ+kZsAZsZ:W7Blp+pARFbhBgnKL+8t8NZC

Score
9/10

Malware Config

Signatures

  • Renames multiple (3379) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\497ea416cc84806b8ecbe1e8221c7789df8ac1757b9fd3a35d5f5a264354ed2cN.exe
    "C:\Users\Admin\AppData\Local\Temp\497ea416cc84806b8ecbe1e8221c7789df8ac1757b9fd3a35d5f5a264354ed2cN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3063565911-2056067323-3330884624-1000\desktop.ini.tmp

    Filesize

    47KB

    MD5

    fd92885e4030ce4595945929cba65ca3

    SHA1

    f3e84bf47d1e1ce45a1b5864de46053c4b30e672

    SHA256

    768d0a66807d103f6f86da7dda8c763f64efc69596a1a177fc267dab40ad537a

    SHA512

    5a97145f1b1280b9982fc5d867ab3c3c80ce9109826d40e7be2ad34c8887dc7c8e9e122e0169306b102ecc7ce4d3491f5d7d39ba3d06a1dc4232e4d5b9a81157

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    56KB

    MD5

    4cff2390daf12fe0b5a2952b3f817017

    SHA1

    3645a432cdbab50bc4822bdc86b69c2f4b41bceb

    SHA256

    d435e3b84db8471f7479d73c38d06a84691198e7e73ee6e29c10af29c0ff230c

    SHA512

    00c027ae6369f9c307fa496616dbd064536f67aa9ab540385759eb3b30c6a9e4b0394b675b2e8bcdf11d60677362bf8e8253bbd5dfce9028a7301ea2fae7b6a2