Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    30-09-2024 22:05

General

  • Target

    d4c9a90fd48f71887318ce00b289f0929c4cf24231f215ce03987079550abac8N.exe

  • Size

    37KB

  • MD5

    efe40048dba28af6fec0a3266ca37590

  • SHA1

    9c905864462ccb73444b5ab2d20c5d6c68f6dcf3

  • SHA256

    d4c9a90fd48f71887318ce00b289f0929c4cf24231f215ce03987079550abac8

  • SHA512

    2db0601af81949636e259b601f9da11bc025a6687d42ce0a31fc6c6d7790c843cd1ca676b5fd69b7ab80e463215bdd4f3f07c4a472e6d849ec6a3cc939f3a9b7

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LOl6Sl5ltWqAhJ1qAhJE:W7ZhA7pApM21LOA1LOl6Ar

Score
9/10

Malware Config

Signatures

  • Renames multiple (3444) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4c9a90fd48f71887318ce00b289f0929c4cf24231f215ce03987079550abac8N.exe
    "C:\Users\Admin\AppData\Local\Temp\d4c9a90fd48f71887318ce00b289f0929c4cf24231f215ce03987079550abac8N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    37KB

    MD5

    4adb947222b62f419ea1492813185a3a

    SHA1

    a2484d069e94696c0d3cb9e2d7a6dee926c436e7

    SHA256

    2bba3fd503d80f4d1fb3c637e3dcc749c0406df083738d358c8e5f1a27d677f2

    SHA512

    c29ce425c1cd9a68b4edcaaa3f7aff910d867c62b59fade6d8444c3347c5167118c66d43cbf119c88bb49658902c231d531184054bd23ae318bd7d5d0241274c

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    46KB

    MD5

    0502d74f37ec5896ae7452d05356d8ff

    SHA1

    3e9c33451ebc2f85a0baea887ddc2af6dd81c901

    SHA256

    91458d2cae911aef72e8f4e171fbb1766ea6d5a330010ba1c7b7d5a596a37503

    SHA512

    ac3c5392846a6fd7740dbc686d8e06e3c0087e2c6e56feaa41839fd36374d7c8bb75d70326d46deabd4449fa8aa8263f18639ab5c3be60001dfcfec83f3e3d54