Analysis

  • max time kernel
    144s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    23/07/2024, 16:28

General

  • Target

    538a76cd2166b3b2b0e88352a2a64f9f13d4bcb2576e0826054ef57c7238bef2.exe

  • Size

    818KB

  • MD5

    5557b6a82bdd90fcab0e34e1e3c025f5

  • SHA1

    586d7469a8f1fcbbc65b4df0f3e26ca49a070e1f

  • SHA256

    538a76cd2166b3b2b0e88352a2a64f9f13d4bcb2576e0826054ef57c7238bef2

  • SHA512

    7f6764316be7adb165262259fa53bb85c6a844fd9e4b6c85af8a13226f2158e2881ae2fdaa6b3f82f8e9a52f4b7da2af428c388796f5bb7695ed17a47f947143

  • SSDEEP

    12288:q9N0xM9tFBB2nFgQPdIjXH2lG+CYCH6tBsS4aKEi7Syc0mrMdCICf8BJJEo8888h:A9TD2nFgQPdQXTJiBsS45DScDCICfM

Score
9/10

Malware Config

Signatures

  • Renames multiple (62) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops desktop.ini file(s) 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\538a76cd2166b3b2b0e88352a2a64f9f13d4bcb2576e0826054ef57c7238bef2.exe
    "C:\Users\Admin\AppData\Local\Temp\538a76cd2166b3b2b0e88352a2a64f9f13d4bcb2576e0826054ef57c7238bef2.exe"
    1⤵
    • Drops desktop.ini file(s)
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2560

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2560-0-0x0000000000250000-0x0000000000251000-memory.dmp

          Filesize

          4KB

        • memory/2560-128-0x0000000000400000-0x00000000004D8000-memory.dmp

          Filesize

          864KB

        • memory/2560-129-0x0000000000400000-0x00000000004D8000-memory.dmp

          Filesize

          864KB

        • memory/2560-130-0x0000000000250000-0x0000000000251000-memory.dmp

          Filesize

          4KB

        • memory/2560-131-0x0000000000400000-0x00000000004D8000-memory.dmp

          Filesize

          864KB

        • memory/2560-132-0x0000000000400000-0x00000000004D8000-memory.dmp

          Filesize

          864KB

        • memory/2560-133-0x0000000000400000-0x00000000004D8000-memory.dmp

          Filesize

          864KB

        • memory/2560-134-0x0000000000400000-0x00000000004D8000-memory.dmp

          Filesize

          864KB

        • memory/2560-135-0x0000000000400000-0x00000000004D8000-memory.dmp

          Filesize

          864KB

        • memory/2560-136-0x0000000000400000-0x00000000004D8000-memory.dmp

          Filesize

          864KB

        • memory/2560-137-0x0000000000400000-0x00000000004D8000-memory.dmp

          Filesize

          864KB

        • memory/2560-138-0x0000000000400000-0x00000000004D8000-memory.dmp

          Filesize

          864KB

        • memory/2560-139-0x0000000000400000-0x00000000004D8000-memory.dmp

          Filesize

          864KB

        • memory/2560-140-0x0000000000400000-0x00000000004D8000-memory.dmp

          Filesize

          864KB

        • memory/2560-141-0x0000000000400000-0x00000000004D8000-memory.dmp

          Filesize

          864KB

        • memory/2560-142-0x0000000000400000-0x00000000004D8000-memory.dmp

          Filesize

          864KB