Analysis

  • max time kernel
    120s
  • max time network
    21s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2024 01:21

General

  • Target

    e0f1b3f44b2bd3e144f1d50dd49a2f912c223a6a700c350f3dbe9968b4012856N.exe

  • Size

    88KB

  • MD5

    2e5924d839eb2fb9166b7d25131d1210

  • SHA1

    373c9a8a544d5a3a1b174ce25521b6df338a4233

  • SHA256

    e0f1b3f44b2bd3e144f1d50dd49a2f912c223a6a700c350f3dbe9968b4012856

  • SHA512

    f8867e0683843b780c9a0884c0c15f36da5b77638234a67fcf3998c270f754f47cb82839843368880eefb917f9cbff1633257e6233eb4767ab869409decb56bd

  • SSDEEP

    1536:W7Z9pApQESOHepOHe8G+6E65dyGdykNdNBKgg0///x9zKI:69WpQE0zxg4nd

Score
9/10

Malware Config

Signatures

  • Renames multiple (2847) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e0f1b3f44b2bd3e144f1d50dd49a2f912c223a6a700c350f3dbe9968b4012856N.exe
    "C:\Users\Admin\AppData\Local\Temp\e0f1b3f44b2bd3e144f1d50dd49a2f912c223a6a700c350f3dbe9968b4012856N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1846800975-3917212583-2893086201-1000\desktop.ini.tmp

    Filesize

    88KB

    MD5

    a0be1f75ef95bf8c84c3cb1c839a0e3f

    SHA1

    390aa54c7e0f6ca6e897387bb10954f9bb49813d

    SHA256

    ac6d10589076e0e6b276dd404913030ac90a6d50633b43217c5dcf742247bda6

    SHA512

    e0c59fca1d82d5b645fe1cb0dbc1d619f762cde3dd6550b58b434e2912425685a22164bb5ff0491fc4eec8c8b6602119db126c6cec249732f9c7a0196e97884b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    97KB

    MD5

    9d9b6eeb4c47caa310a57620d764d733

    SHA1

    e308c74262a4de22485a2a5d70b1fd5b8e39a0dd

    SHA256

    dd8f342d955dce2447c690e1c7d7933140a53677c266bc8839a93c552c466e73

    SHA512

    247871d717a47b2b9b0ecd9240cf6af2eded39712f522e48f9420b4865c16cfc77f7a5d72795da2b4468b532dd089f74978869d014373da4f63ddbf871dca518