Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30/09/2024, 10:11

General

  • Target

    e6b5261ab62e9d02107faa584a6419a653233a98ca2e00d04b7aa3ad926c0f01N.exe

  • Size

    48KB

  • MD5

    d54aa880e341119ab53fcc22d1b2c680

  • SHA1

    aee78e0d4c8bb95e929c7826689f87054eed5354

  • SHA256

    e6b5261ab62e9d02107faa584a6419a653233a98ca2e00d04b7aa3ad926c0f01

  • SHA512

    38c048918f946c7a343519deac40c11e6229d5f626901bb13060ed64fd44959321952d9966e8ff54c25f4005d45ac24c68d7be4b3cb046e1958c90b7c91d5d97

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfproFNFZPsFhiXFhioBBB5:W7ZppApBULcfpHLcfpyDZPQqpBBB5

Score
9/10

Malware Config

Signatures

  • Renames multiple (3342) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e6b5261ab62e9d02107faa584a6419a653233a98ca2e00d04b7aa3ad926c0f01N.exe
    "C:\Users\Admin\AppData\Local\Temp\e6b5261ab62e9d02107faa584a6419a653233a98ca2e00d04b7aa3ad926c0f01N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2220

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3063565911-2056067323-3330884624-1000\desktop.ini.tmp

          Filesize

          49KB

          MD5

          b54fca51514e70b6906dac3d1834be3e

          SHA1

          a9bd95e4993300d47179545a6244abe902e829e7

          SHA256

          9ed98633cd15150ebfc1e2eb675f62598e8da302ea586800775ae7290278fadb

          SHA512

          32db38c6740b67d6f9bbe81c5910ee3c3a9afefd1884e56ed648d1752b76ab8e9378f8ea1cf10b55899231a99735468367e9a87c41e65c617ced4651104c1f4d

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          57KB

          MD5

          5a5931d194092dbcb5c715cb38b640cc

          SHA1

          6afb40ac1f0bb3dbc2b83c9d020d11b9d1ebe632

          SHA256

          b05756b141fdffa2a92cd20d874d14474226bc246a894cfeb7303d7b482cdaf2

          SHA512

          824e45829426c52de6f9fa0b26be576731ea8e0da08ad3020362fad0d421533304ec215b4e42482590d9548ddd6f993e677d74a8a008744a015652fbfa76c2bc