Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    24-07-2024 05:11

General

  • Target

    fbd91c33db2d2deec1779820d1bd197734321e4a007beddf8a1185a1a5bc667a.exe

  • Size

    57KB

  • MD5

    c51958289d5d4c79ba5937210c968a81

  • SHA1

    ac10a070356bc43d49879e24e4b121e7dc1d4d29

  • SHA256

    fbd91c33db2d2deec1779820d1bd197734321e4a007beddf8a1185a1a5bc667a

  • SHA512

    91c6227f72169c830ad50cb20e715d9900300b07e38f1ed8e735cb752bf5cb5c54156f2f17f73e0d7f21571ee6d134c75ca426790ec5edf42e53a8cc722b26b2

  • SSDEEP

    768:/7BlpQpARFbhIYJIJDYJIJxfFpsJcEKLF/MF/28HaT99:/7ZQpApze+ejfFpsJPKZ2e8HaT99

Score
9/10

Malware Config

Signatures

  • Renames multiple (3457) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fbd91c33db2d2deec1779820d1bd197734321e4a007beddf8a1185a1a5bc667a.exe
    "C:\Users\Admin\AppData\Local\Temp\fbd91c33db2d2deec1779820d1bd197734321e4a007beddf8a1185a1a5bc667a.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

    Filesize

    57KB

    MD5

    3cfe3644355bf23d6f873ec8c2f3c2d1

    SHA1

    702ee2f43058eb2f231abbb95e0d5a4a3fdd4c80

    SHA256

    02d25e0dea4713a7c48acb1e2f4b647e2bbbae0c68bb386ff51cd35d23558c5e

    SHA512

    59f8ba38fcb41ea307f6700ccb699a782ad58d60f51db8a1c14b0dcac97ef062bb6b125d1527549ed407f366ebea6f5df7465fe2f0a68bc58a64c38e58570131

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    66KB

    MD5

    c72ebbc94bacbf19b6352aff50cfa8ed

    SHA1

    22d0e2d2dc7e4a0b8ad3a9a0034d9e45a82d7da0

    SHA256

    fa50844ebc01f789b235d4867fad0ec8cfcbd64eaef7d62e91bbe5a8873fa0f2

    SHA512

    df2898ac06a282055ac7d8dd62e86d43cc7ea886262436b943bfb62ff577368bb2c4c3e1f8c462835b2522a6e284417e97a1e3fa0b80cb3f8cef2e6986feff01

  • memory/2088-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2088-396-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB