Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 03:41

General

  • Target

    d9d6a1b0959a8a8bbab0d8fc59b1639b12b82d37a316bd8588005cb63d5b9628.exe

  • Size

    127KB

  • MD5

    5e988b1b46385bf5db116c2ad53cb6c6

  • SHA1

    f9ab2c5059e443dd5b2804a4afc7eb5d811c4f7a

  • SHA256

    d9d6a1b0959a8a8bbab0d8fc59b1639b12b82d37a316bd8588005cb63d5b9628

  • SHA512

    0f298b2de531193792692c91f3e1decfffe768846d545fee6f4799da61f210239a0ecb3b70a7d60835b9828525af78e6208b484868f9b24851836e2151c1f3ff

  • SSDEEP

    3072:6e7WpHIyRF9ESWu0SWuDmhSauvEKxVTLJtxoVz8FUDrYYaCusjdEKxVTLJtxoVzE:RqlIyFESWu0SWuGSwxn

Score
9/10

Malware Config

Signatures

  • Renames multiple (3452) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9d6a1b0959a8a8bbab0d8fc59b1639b12b82d37a316bd8588005cb63d5b9628.exe
    "C:\Users\Admin\AppData\Local\Temp\d9d6a1b0959a8a8bbab0d8fc59b1639b12b82d37a316bd8588005cb63d5b9628.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2288

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-481678230-3773327859-3495911762-1000\desktop.ini.tmp

    Filesize

    127KB

    MD5

    0efbc37dde14f054c4cb35546679a708

    SHA1

    408c4fb92a07baead8bedafb606944d31806e209

    SHA256

    e1a2da47ac757392bfa6cbaefc803cc04916755d393287fbdfec0af60293c3ef

    SHA512

    8661a92612ff0897a432d718928895202be64bc3bc6b5782fce77768ae55bbda1ab4e1a69f60e554edebb61677c741dba75c231fdf2c98681f4c1f10d543744d

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    136KB

    MD5

    249df372bc4e57852787a9e6b89c0213

    SHA1

    5a5536805d80e62aa7bdf651777bea3d05a673a9

    SHA256

    ecae16bb92bf655a773a240903200a9da751a0730330452838ca9ed52a3937f8

    SHA512

    1ef04762066c8ce8e9b9915a2219ca13975c8058d5dfdf63d61df135daff8706ac0ce8c2a8f7f372f63704480fbf6e706bffc1aacf01ba57e7df1b14954813ab