Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    15-05-2024 00:03

General

  • Target

    89468cbd15c7464a14c35b21cce78574a3512649bdb7a426e2aaeee200d98058.exe

  • Size

    128KB

  • MD5

    4a332868fa08418e4a53ee8173bade43

  • SHA1

    524846382447024e0bb8ab1f185423eb4b70573b

  • SHA256

    89468cbd15c7464a14c35b21cce78574a3512649bdb7a426e2aaeee200d98058

  • SHA512

    ab808b6ce8d38012c664a333db74ae115baca8539cbd646a59ce09228b1cc1861d6b16b1b470c22b8068ef71f707d34f78f5fe2c95270eb0f91cbbcbd243a5a7

  • SSDEEP

    768:/7BlpQpARFbh2UM/zX1vqX1v+1WbW1rjrA9ZONZOD5ZTXB85c50KPKN:/7ZQpApUsKiX26Ka4

Score
9/10

Malware Config

Signatures

  • Renames multiple (3443) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\89468cbd15c7464a14c35b21cce78574a3512649bdb7a426e2aaeee200d98058.exe
    "C:\Users\Admin\AppData\Local\Temp\89468cbd15c7464a14c35b21cce78574a3512649bdb7a426e2aaeee200d98058.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1640

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2721934792-624042501-2768869379-1000\desktop.ini.tmp

    Filesize

    128KB

    MD5

    a01262951365ffdddedba5f0b9fcac6d

    SHA1

    07c968680b75e853684eaa353578f4567437ccfe

    SHA256

    949aade15a88b4fbb76e0c67a448314be92658f0856236db9668879296213535

    SHA512

    7d5799f782310101e410f0fb3c581ea63cc947a0044a41d87b2b1278774d529d7b5680b24e25deb6ed10b0bfe558885d86195130f3b1e15c247f5524f5a51e98

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    137KB

    MD5

    1164f88ba371b55c3e0fc58452e13885

    SHA1

    6167d5cc9ba97207458be398f5a73d2cb08adb28

    SHA256

    cb64adfc59e71653e39a1e4516bbbd69bbf7f47141124ecc17050984f708cbbb

    SHA512

    ffdb12da3ae8c0926127f7d0985550fecc6af622920b49cbcf13473c706a82d2833d2414fdcf4c1d4b615169a979670a4a854c1446a57b8234ced7bcbd0a69af

  • memory/1640-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1640-500-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB