Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2024 01:27

General

  • Target

    cdb43e07a7bb191724049df81ccac147f05e64a365f058d7f60709dcb9c9cec8N.exe

  • Size

    36KB

  • MD5

    cbd007d1d62a614f5d3a3147aa77b450

  • SHA1

    4a1c163b574594a69265083d5479202aeac57fcc

  • SHA256

    cdb43e07a7bb191724049df81ccac147f05e64a365f058d7f60709dcb9c9cec8

  • SHA512

    394c9ccc701891426473eabad8a57c63bdfd853725add8a431a2257641e9001debcd9ea83cf152c9afdf83f23aca400391e176b353b993d8b73c7308a7717bdf

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LOl6Sl5l4en:W7ZhA7pApM21LOA1LOl6len

Score
9/10

Malware Config

Signatures

  • Renames multiple (3216) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cdb43e07a7bb191724049df81ccac147f05e64a365f058d7f60709dcb9c9cec8N.exe
    "C:\Users\Admin\AppData\Local\Temp\cdb43e07a7bb191724049df81ccac147f05e64a365f058d7f60709dcb9c9cec8N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-312935884-697965778-3955649944-1000\desktop.ini.tmp

    Filesize

    37KB

    MD5

    a87c39afad5b7f04c8ff2ef5adc71842

    SHA1

    cb485b17675a9fab75f6e54c7a3850e95794d5c7

    SHA256

    42cf61da77b1829b08500865047a9529bf7c87bb7eee76b7f63550f88cb75125

    SHA512

    4206a614d7cd36d808783142088d71c39999f85ad105d08a03d2ddaf45c18c7de4b553892eb0f3d403b9424b629d73f064719eb16c1cea23864e40d63cfd03b3

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    45KB

    MD5

    e1cf8a74b21b200278285f31553654b3

    SHA1

    860d3b9056e41db419af1319f6c75b50d3ba9eca

    SHA256

    81b4cc30e839b1c0a2b7eba1153be848438e6896eccdf69b44e62ccb7136ffb8

    SHA512

    a78836d6e74b4cdf2160c924401522bd46a4e79ffb9aea38b3f72a8b8714ffb78d9dcd37d90b0fba774a4e2c0b867255f00f938fd26b4732168df77ca33238fd