Analysis

  • max time kernel
    1442s
  • max time network
    1447s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 02:21

General

  • Target

    4561647.exe

  • Size

    7KB

  • MD5

    ebbc82f619471384f392efd5c4d05883

  • SHA1

    17d91b45c8615d0f09d1100d2be396cbcba21fde

  • SHA256

    e972af26d5261da3daa1e12e11f357e1e4ce19cd43997f6b7a925a5b9cc8614c

  • SHA512

    3e33bd22c440e9ab4a065d216467c1220780aa2a39a38ea4aec81d050d3e6048e87244341fbeac2cdefebae9fe987b713e0d4fcf34adf1390b5ccda6dd448241

  • SSDEEP

    96:uP/EuJO5ER8KDGrru1M2mIspl5SgOj9/xVKzAQTH1osaxnkK:unE5ORTD91M2mIGyxhp2AQRONkK

Score
9/10

Malware Config

Signatures

  • Renames multiple (980) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4561647.exe
    "C:\Users\Admin\AppData\Local\Temp\4561647.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2476
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\4561647.vbs"
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:1056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\!_READ_ME_!.txt

    Filesize

    502B

    MD5

    d77ef60365a97e613df9b8d14a4a1e5f

    SHA1

    95144eed42fed5f7f4e022fd673c7e461bf5d38c

    SHA256

    1f373d14bb2276f95b7b7f2ad46f330ecec9853f8bfb859b3c78d92e7e7eac8d

    SHA512

    5e460e0717ebd6c368dc6cfd92907518105f2221ee04028c16697be5f75157003e6f3fbf46e879ce133f94e3830cf0d3aa3996bf52bcf2b78d9a952b2ccadbf9

  • C:\Users\Admin\AppData\Local\Temp\4561647.vbs

    Filesize

    373B

    MD5

    5c9b9a4fe85362e6c42b9ace3f231981

    SHA1

    ee667214f20c1ee5551c522b27a4f3252fee3e24

    SHA256

    7a5df25d2805fd496a47c6c2315d3dcea10d14d85b159c1fe9113430cc25bb3e

    SHA512

    8248243f786049f80304ae76e8a9d5e1ac182f5ad9d1e37998f771acb6e4aebf54a2ec08650cf472a921ab1a8a7462e3b0ff340054b1bab1da4facc10c6039fc

  • memory/2476-121-0x0000000000400000-0x0000000000507000-memory.dmp

    Filesize

    1.0MB

  • memory/2476-1618-0x0000000000400000-0x0000000000507000-memory.dmp

    Filesize

    1.0MB