Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/10/2024, 20:00

General

  • Target

    d457ecd961565056f89ec4fa065b67b1cdcb046ea3caff7ce476844b5dc04683N.exe

  • Size

    87KB

  • MD5

    bfd1da1beda3e01c878da565462285a0

  • SHA1

    c3761151b1f64d5008e7a3a2bfd231fb897d0965

  • SHA256

    d457ecd961565056f89ec4fa065b67b1cdcb046ea3caff7ce476844b5dc04683

  • SHA512

    dbfd9a2b220b2275beb359195e732523676ff5b688a812b42db117f39df9f8eaaf56835309c4b8c838cef83c3ff97b9aaea004fc6cf5e137482d85590c7b8d76

  • SSDEEP

    1536:W7ZppApUFpEhLfyBtPf50FWkFpPDze/qFsxEhLfyBtPf50FWkFpPDze/qFsAcEhu:6pWpUFpEhLfyBtPf50FWkFpPDze/qFsz

Score
9/10

Malware Config

Signatures

  • Renames multiple (3136) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d457ecd961565056f89ec4fa065b67b1cdcb046ea3caff7ce476844b5dc04683N.exe
    "C:\Users\Admin\AppData\Local\Temp\d457ecd961565056f89ec4fa065b67b1cdcb046ea3caff7ce476844b5dc04683N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1732

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-4177215427-74451935-3209572229-1000\desktop.ini.tmp

          Filesize

          88KB

          MD5

          420447651358b7273404a914cfc0d7bb

          SHA1

          d5aece9ca2f6ae04ab88d9654c0ec09ca3375b29

          SHA256

          6960f1e63d02dc715a644fbf64672268141db4df0095c07d4b9df5d2761b9d37

          SHA512

          6e557edc7a42519e1025cd212e291b35ef60b8d469df53766345beea9a2c14573ba498f7a40d383e2e8543ffbf0ef19606918a831296cce4a6d48f2c0e392fa2

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          97KB

          MD5

          bb07f79b9422f68391ff563c1e88f4ab

          SHA1

          d613217bdf02b8a536f6af9c003162a97c2705e3

          SHA256

          80b2191c570f1bc1f2efa08fdc9397ba6c304001d36fb008e911992a55551022

          SHA512

          1dbb9023be6db2ce4ee93beb968fd6d852e3edf2d6a409864a626aae8a894e5b8eb46de7b09d3762e74db8296504cba208d1816e5ccb0686b1dfa254ca5c29a3