Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25/09/2024, 09:44

General

  • Target

    ebf09e3ed108a110c2e76e7c4651a99a17e5664b960b97f78a6ff17c64bd3683N.exe

  • Size

    33KB

  • MD5

    8a31a86065359e4a3fe87e0fb95b2370

  • SHA1

    23e371ed35028d446b7cacb3401a4ab7516b7725

  • SHA256

    ebf09e3ed108a110c2e76e7c4651a99a17e5664b960b97f78a6ff17c64bd3683

  • SHA512

    cad9cfc6ddc17568b50ce6c27584b68bfac3e8e68eac80c526cbd39ead6854b0ad928666ee852b9a90620be6a416edaf8dda8497e9ac060d42d4f8bbfc9b2c74

  • SSDEEP

    384:GBt7Br5xjL9AgA71Fbhv7bhv3KueKudLl++K8e1:W7BlpppARFbhjbhPKueKudLw1j

Score
9/10

Malware Config

Signatures

  • Renames multiple (3208) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ebf09e3ed108a110c2e76e7c4651a99a17e5664b960b97f78a6ff17c64bd3683N.exe
    "C:\Users\Admin\AppData\Local\Temp\ebf09e3ed108a110c2e76e7c4651a99a17e5664b960b97f78a6ff17c64bd3683N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1864

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2872745919-2748461613-2989606286-1000\desktop.ini.tmp

          Filesize

          34KB

          MD5

          185c4c23ea625837a98165c6db88d0b5

          SHA1

          7795d36845b18e924373d530fe7ad53f6b6f1d8f

          SHA256

          67db43f81d79d14f9e6b428e586d546a30b8892a04719d763f760341fe0c24fb

          SHA512

          4207a4f6e596e76f8f106b90d6bd725c930c2758e610d833cbd12df60bc4f5b52e275917016b2f1269260fac18030ac06e029f52cf3ed7f6dd4ba5d6a973c5ca

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          43KB

          MD5

          218d40eade5a519f1aa2ffe0c69f87ac

          SHA1

          c08c5b38a03040d9c0199a3ec226936b231cedf1

          SHA256

          986a2f64d26ed8137605288a577357292d538c58d80edb767d884920693fa21c

          SHA512

          4fed6806074d4128416c35e284e7584cb2b80a9c544f664a01b520d5becea7452c9bcbaba99e3ffa9f63e468de404600857b7038fb3f1e1e8e96942ba565a09e