Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/10/2024, 03:08

General

  • Target

    1e1c2668ee7fe86862d4c87d4790626c93915a54891d832529f45724901f0b1eN.exe

  • Size

    146KB

  • MD5

    e3c361bb249153b3cb0e4fd990ef5840

  • SHA1

    df672d0a42357791313b2c0e516924f19b3dbae2

  • SHA256

    1e1c2668ee7fe86862d4c87d4790626c93915a54891d832529f45724901f0b1e

  • SHA512

    599d798a28dd1a43a585e642fb10a3997ff1914b1b536eb57983b6857220703d45e83580c2796e417e54c1bbe43e68dd52247ea0c958423aa6fa31e91f10e58f

  • SSDEEP

    1536:W7ZDpApYbWjIoPyPoLzV7c6Sh1XtkkkkkkkkkuC+2fraAmtQHyiNueOyAB5+0YJb:6DWpAoOhQSicJgyybxYm

Score
9/10

Malware Config

Signatures

  • Renames multiple (2854) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e1c2668ee7fe86862d4c87d4790626c93915a54891d832529f45724901f0b1eN.exe
    "C:\Users\Admin\AppData\Local\Temp\1e1c2668ee7fe86862d4c87d4790626c93915a54891d832529f45724901f0b1eN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1940

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-312935884-697965778-3955649944-1000\desktop.ini.tmp

          Filesize

          146KB

          MD5

          7d6453806a5809e52c39fe7469f7aa34

          SHA1

          9ed89ec6d740d511bfc3be7446f24a1edd428e2f

          SHA256

          887d6f43ec631845386234feb3e34117555556b67c88d8131311878de3b04e75

          SHA512

          7ae5967de456a7dfc193885fa4baee55ca0f24c3952f4a18dbebfd6b98dee0bab066b2e653981bb11b9513a9f54cb7ddec1d6fab429b3b895436c5cef3b0e0b7

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          155KB

          MD5

          8f2c829dd1d60677306ed09065b8ab50

          SHA1

          9068a662e84fd53c427ae1d9700cf88344968662

          SHA256

          90a16d968028fb367d59f4f253a3ce48fd6e3f1898e52775b8e5ddcd3e995a06

          SHA512

          eabb024f4061c1efb6bce8d14579f758ebca4815d84cfd347aa4598fabb63b020ade448e9eb9df90d7b1fe9a38f8f39aacf83b3cf23b8f29e476e449f63b6df7