Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08-10-2024 21:24

General

  • Target

    4e7055bebe65f2b8123beea7a4cdf74ac7fbe8b71ef4a3d4f69b9522810ff8eb.exe

  • Size

    50KB

  • MD5

    5cff3143b8267682e383831055c8f624

  • SHA1

    9d6706413dc952dafbc61fdaf11ff2d274702c24

  • SHA256

    4e7055bebe65f2b8123beea7a4cdf74ac7fbe8b71ef4a3d4f69b9522810ff8eb

  • SHA512

    1a74baf6ee32f1fe479462f894cfba2c1560aa4d8991efac6b574f78e7fee70b6627932843062ba0a498aa313162d221a53d739fd70accac9915f8fe21609ce0

  • SSDEEP

    768:W7Blp+pARFbhBgnKLMWK9WKD2N2LSarSaAsE:W7Z+pAp2nKLRKIKqoLSarSaAsE

Score
9/10

Malware Config

Signatures

  • Renames multiple (3656) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e7055bebe65f2b8123beea7a4cdf74ac7fbe8b71ef4a3d4f69b9522810ff8eb.exe
    "C:\Users\Admin\AppData\Local\Temp\4e7055bebe65f2b8123beea7a4cdf74ac7fbe8b71ef4a3d4f69b9522810ff8eb.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2100

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini.tmp

    Filesize

    50KB

    MD5

    4dd2ca818dae11692e313a0a994c2d6d

    SHA1

    6f2b3b75e3d1b6338af90f39702204589aefffe4

    SHA256

    282d081a9a148fdb5abb23e8263fc502ba9796a8e3558f6929f1419f1ee1e72a

    SHA512

    e390f5b3d9eab13556f89787765c8b5a44003e14025b91c09443a6ff9b83890de5689aaccce8827d685b11fd88957b65f83ecbd84d7f8a4164d19cab8cd7e3c2

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    59KB

    MD5

    809f81c0f97f23d55cb59c1cca200e5a

    SHA1

    3698d02f184d48b653fd610544e699d2bd73468f

    SHA256

    cbef4c59dec2e30407ef8954514b810a97883684f31bc3e498af8662d0e0a3c8

    SHA512

    318f75271ca8a5597ce5ecd2ff50f807604804e604348d6ea38fd7eda466f584bd73bc6c8b9316a180f8939743b20d28352cbccc402863c4c7847da0bfd83144