Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 23:10

General

  • Target

    e7cd883f0938e9f70b73f58b13dc579019079b364209400c2dd1df99dcf14b2aN.exe

  • Size

    40KB

  • MD5

    4a0d1b68153e1aa6b06904456c96d6c0

  • SHA1

    e76cbe787e7f486d9384803401542e90e2568bfa

  • SHA256

    e7cd883f0938e9f70b73f58b13dc579019079b364209400c2dd1df99dcf14b2a

  • SHA512

    d6bddc4443a68fda07aa33334afb9ecf00ab9a40f08175930e5d9b49bd3ddf7fcf3822e6281762af9c8a1574fcd0b45c1616d4b12c5dcbf7a9117a6b3ec8cdfc

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LOl6Sl5lsSGV0g:W7ZhA7pApM21LOA1LOl6vSGWg

Score
9/10

Malware Config

Signatures

  • Renames multiple (3441) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e7cd883f0938e9f70b73f58b13dc579019079b364209400c2dd1df99dcf14b2aN.exe
    "C:\Users\Admin\AppData\Local\Temp\e7cd883f0938e9f70b73f58b13dc579019079b364209400c2dd1df99dcf14b2aN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2536

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

          Filesize

          40KB

          MD5

          2bf61362916c1f7ce37f241c441cf7f9

          SHA1

          7faf37acb0ff264f667527163c63e8348a9dcc47

          SHA256

          8cc4c3a503ff72befcd1b88ad6c5279bd7fd109f73f29c63666e9d13199d172c

          SHA512

          bab0a4b0c5a9ccd031477ee993799d3f5cb89656ba280b940df1566304d1d8b33548609dcfd4a9470c5a71d12f6da3e067a39bf3d0f35f133e0baec9d33624ff

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          49KB

          MD5

          05cb66d27a3b22fef70ce8c0f26cb942

          SHA1

          08233a406fda68a6b5687707b42dd219c56d36e4

          SHA256

          555db8d0ff8042b26f9d8f655a98d14490fea44c236d06bb508c16d3ad293f27

          SHA512

          235e5a33a8b656534947b0d5e25925ffe3a3a20738622bddbb4249e3b74e7779bca745f9c69346747c3ade8bf2c083b1ec0a929daec79e9df990c1062fad0755