Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:42

General

  • Target

    d4eed3f0cd33293c88f64a6bc9f9fdd33c3a429821989699d88290147c9885a3N.exe

  • Size

    90KB

  • MD5

    116ec9d4c789364f72812ad8b64e2ec0

  • SHA1

    e5d50d7e18c71babe10da3fb34bc0b3f6c3941b5

  • SHA256

    d4eed3f0cd33293c88f64a6bc9f9fdd33c3a429821989699d88290147c9885a3

  • SHA512

    96d4b4585bdda2e1224f9f16b1dd748c800983034561cc1833e82338954b9f36b0995c5aeb03eb50953ce8b5ecdb965210fc244304be7d2a09daf670a28249c8

  • SSDEEP

    1536:W7Z9pApQESOHepOHe8G+6E65dyGdykNdNBKggqSXrA:69WpQE0zxgjrA

Score
9/10

Malware Config

Signatures

  • Renames multiple (3100) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4eed3f0cd33293c88f64a6bc9f9fdd33c3a429821989699d88290147c9885a3N.exe
    "C:\Users\Admin\AppData\Local\Temp\d4eed3f0cd33293c88f64a6bc9f9fdd33c3a429821989699d88290147c9885a3N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2308

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3290804112-2823094203-3137964600-1000\desktop.ini.tmp

    Filesize

    90KB

    MD5

    6d5dd06149e8ae7feb1879c456ab7db2

    SHA1

    cd1fb6923931d9ba45412f79e796a75af40ad14c

    SHA256

    f4971a4317f02e1728def3937c34026a772f9824b8d9a9a2b3187a93d0314ff4

    SHA512

    106033b034239f4f9a79ee44fdabd0011a233345c945ae5667f2e0013a918d0790d8d3b01c31c85fedff685918605d5c1c492cb7333f0c41c7917354d05b33c6

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    99KB

    MD5

    f3767da3a97cdde7b27f1dc9a944b842

    SHA1

    722c5f0fab9b10e1cc08646796dbde6e6149d92e

    SHA256

    378ed9d54ec36a30b8b273db1d59828829f4d69b000b63f0b60addb89e5769c8

    SHA512

    c55365e81c3b74a8c59f85a23ecd390d02ec7392af07e4f538d0fa30e6c5a0283fec948b099153b65b5abf47a030d80e6c52eea270944438119d31abecb8f353