Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25-09-2024 03:25

General

  • Target

    e89e9083b960689d748af36cccf97651b7b45a9fd109fa613c94aee8b3c138e7N.exe

  • Size

    51KB

  • MD5

    8bad9f43cf8e5096fc32b51b654fcdc0

  • SHA1

    b017936a5ca256363d0839858de546fb34edb56c

  • SHA256

    e89e9083b960689d748af36cccf97651b7b45a9fd109fa613c94aee8b3c138e7

  • SHA512

    dc4499276170c254763d97b4dd2e9988723821966bf304ce19da095b829cc57f23b5664c60b773e5087b4afff0e58910cac2587e9557d9a03d2d0250647d3f20

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LOl6Sl5lz/g6sHzcXHzcC3OTHTKwJ:W7ZhA7pApM21LOA1LOl6l6YzqzV33wJ

Score
9/10

Malware Config

Signatures

  • Renames multiple (3740) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e89e9083b960689d748af36cccf97651b7b45a9fd109fa613c94aee8b3c138e7N.exe
    "C:\Users\Admin\AppData\Local\Temp\e89e9083b960689d748af36cccf97651b7b45a9fd109fa613c94aee8b3c138e7N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    52KB

    MD5

    424601d15169553afadbcfb36b0a6186

    SHA1

    056c4b25accc2955ba3c2ca19f4cb72fb5dd27aa

    SHA256

    03b50cc4917654385826d86dbf371b9a270c9034cb2a7934f56fe1b51a5f3b6e

    SHA512

    1f9b8d51f0421ca6570c26b20a3a0965dd44f00d0006301def24fb3bf570cc132d3654edb1763303a5525b69923df6c3bbd1a28208998140688a5e799c44a15e

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    61KB

    MD5

    64daa6199094e36c480f301bb3bbecaf

    SHA1

    5aa9d1927786bf5107ae73a847b226b8b6c944ac

    SHA256

    933f68ca28c9ff27a50b90f1f8b645b0ac81f359d0bcd49416fcf25f38bc32e5

    SHA512

    7468c988338c3d34a0065e08a8c02c0489566af5c70c87ef05f66a52d88a250888741da86d07bf0d7c8d07e487990b112f420a2b301ba575440cba02d6f1569c