Analysis

  • max time kernel
    119s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-10-2024 01:53

General

  • Target

    5eb1bcfb10ad3763b8ec2cf273628612c3267437f18e598aa6b4ca933d954963N.exe

  • Size

    75KB

  • MD5

    c604e786f7f86c4604e0e8f8e352d9b0

  • SHA1

    822af4aa6918e5a32839f0e7c20122acba9708e5

  • SHA256

    5eb1bcfb10ad3763b8ec2cf273628612c3267437f18e598aa6b4ca933d954963

  • SHA512

    522f5fdd2812abd03bf559a952342f5478ee77afac834c9bb4da25428176cb8fa6eb08e0ac158a9ff8ef93cd252d2e94c520f36cf62dbbb4ea508c872269fe2e

  • SSDEEP

    768:/7BlpQpARFbhIYJIJDYJIJPfFpsJcFfFpsJcC+3mC+3meDAfABJ6fABJwEXBwzEr:/7ZQpApze+eJfFpsJOfFpsJ5DJ

Score
9/10

Malware Config

Signatures

  • Renames multiple (3165) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5eb1bcfb10ad3763b8ec2cf273628612c3267437f18e598aa6b4ca933d954963N.exe
    "C:\Users\Admin\AppData\Local\Temp\5eb1bcfb10ad3763b8ec2cf273628612c3267437f18e598aa6b4ca933d954963N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3290804112-2823094203-3137964600-1000\desktop.ini.tmp

    Filesize

    75KB

    MD5

    491d938a439e41e7e665dd41df1e6e0a

    SHA1

    8c9b2bb6a096c509d0cc6fdccc2b93e0ff75e6ee

    SHA256

    4317c12cbc9be12152b8f206e0bc3d28afbf2d077fca2eba2414189f6c92ab4c

    SHA512

    764f7e126a7823afed68fd9adefaae6d013efd222b731e67d8bbf2c2e7090658d5fc0d8af6ba42e3275997224fa578e9f923bc787667591333b0494638dfc1e2

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    84KB

    MD5

    f08d6dac8ceab77779d38aeaa194d822

    SHA1

    1a65cc77936251901bebd40d92e2d3e215a3f737

    SHA256

    5cb0a57bd04ee00d9cd8bf49abb44c80b797a8bc35636f5573863893a797f443

    SHA512

    49feab66c5fbc7fa940afef61dd1f43843f6ab6aeb1a660961d34c888c26e3368faad23be127a81e97237a66c209d627b3c0a3de7d70d6cab37c5edae0ec4d22

  • memory/2364-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2364-74-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB