Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    12-05-2024 02:59

General

  • Target

    becc70ef04ee703b9a24bdfed59ae46872381ad944b4c0c9961a28116dad7c28.exe

  • Size

    137KB

  • MD5

    3fa1d1251017f175b94555bca9cd3872

  • SHA1

    e8c8194633f5e736ba07fbca99830a37c5483bf0

  • SHA256

    becc70ef04ee703b9a24bdfed59ae46872381ad944b4c0c9961a28116dad7c28

  • SHA512

    105e35507b3b2452eceb0b65a728a6704a1d8d0895536bf5abab98d96c42595c76020f4277822bab80cda16a00bab4a966e1696251c8378867c4cb88c7205af8

  • SSDEEP

    768:/7BlpQpARFbh2UM/zX1vqX1v+1WbW1rjrA9ZONZOD5ZTXBvjfMfvjfMMfQsblBOf:/7ZQpApUsKiXBvzwvzXJvlwJvlJ

Score
9/10

Malware Config

Signatures

  • Renames multiple (3390) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\becc70ef04ee703b9a24bdfed59ae46872381ad944b4c0c9961a28116dad7c28.exe
    "C:\Users\Admin\AppData\Local\Temp\becc70ef04ee703b9a24bdfed59ae46872381ad944b4c0c9961a28116dad7c28.exe"
    1⤵
    • Drops file in Program Files directory
    PID:764

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2737914667-933161113-3798636211-1000\desktop.ini.tmp

    Filesize

    138KB

    MD5

    36b917b011e9ced564bc6de675190edc

    SHA1

    b55f877bb0af068167ce7d3cd850790639e6eb12

    SHA256

    6ae51b26b88bae1936973ba0b86c2375aab7e3506a9a7ed35b1c602ab9acfa4d

    SHA512

    52989d6f7145b4c68e3b424c737a1087d5af007c92727b8e2d2c8e4fdce52abe2373a4f034bde4fdf7f5502c1d83f26b94661da53549cd51308739c31f5e738e

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    147KB

    MD5

    b72e5b0effe7147eccda5cb2e1006809

    SHA1

    3743b497babd46bcbed84a2a5e261d90b475d64b

    SHA256

    78ea212aca450f416d3d5488d79c8301b5fa2599cfde6a1fc23a521a3d129162

    SHA512

    0de10723821e610b78f8a9f8b2a1a94b7834a69dc89512ee2f7ea7813c1a104096a070b941b04a163cd49053748c876835cb1e3b7eb9b4664dc388ca40c9da32

  • memory/764-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/764-542-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB