Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2024, 00:13

General

  • Target

    eb9eae02609b18f0df4bbc65bdf1a3cb88c0d39d64a8bd69eac2b09a1789662dN.exe

  • Size

    53KB

  • MD5

    e77514231aa20666aca5d1bd34b4cfa0

  • SHA1

    a6c97b6ac497ccc3180e11f1dd7a6fb5cf6fd92d

  • SHA256

    eb9eae02609b18f0df4bbc65bdf1a3cb88c0d39d64a8bd69eac2b09a1789662d

  • SHA512

    43478d37a23edfaafc9cd2de40f9459eb93bf033e29b00b63a3dcbfbbefed43d22485742f412b20d5e461f8f7ddad2be7c42203a1e32051db68702d8d5ba25c9

  • SSDEEP

    768:p7BlphA7dASbSLJJBZBZaOAOIB3jM2jMO/vY6mYHV5gLJAbHV5gLJAD:p7ZhA7dAxJJB7LD2I2IGYoND

Score
9/10

Malware Config

Signatures

  • Renames multiple (3438) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb9eae02609b18f0df4bbc65bdf1a3cb88c0d39d64a8bd69eac2b09a1789662dN.exe
    "C:\Users\Admin\AppData\Local\Temp\eb9eae02609b18f0df4bbc65bdf1a3cb88c0d39d64a8bd69eac2b09a1789662dN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3290804112-2823094203-3137964600-1000\desktop.ini.tmp

    Filesize

    53KB

    MD5

    081ddc2b3a936209d64700bf8a2f0515

    SHA1

    0cff0756ddba33e8feb2ae6d44e8348e17c72876

    SHA256

    4a5a46ef0b61790dbcd7356b7bff50cede6fd8230aa57da7aef1dcd90c6f5e4f

    SHA512

    084813bb2c1120c5dff04edd9755973481c0308626ba6d43f2ccf119e9c622daa44a4f2c5d0fd7cc0024c29d5e2afee822da5cf4b5839545aa1b690a6c75717b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    62KB

    MD5

    6e5c6bb0813a740911e7d136a28d8bd2

    SHA1

    f386484c4632b884b50805b77dc6a29f2ac5741d

    SHA256

    26df3b0bed229871a7a498f28c1d0896ee7fb7a495ae6ca992899816a8af0591

    SHA512

    dc2f39c85a5d441e9c24a9ae0e57764ae621b24725b1615dabdb94d41b27cf16be4fe58c904217226aefbbff9fc6d0713b27a48f3397e673ee9c7153f9ef0b36