Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25/07/2024, 18:26

General

  • Target

    086e5ba07fdfa8a842b15b3c06b3ab55db434f85c95cab12ffbfb052fe2f2f62.exe

  • Size

    44KB

  • MD5

    2d0f315238a564c20c551fdb9e30d0b6

  • SHA1

    36b119c86fd0b202b6ec8eb46c47198004456c01

  • SHA256

    086e5ba07fdfa8a842b15b3c06b3ab55db434f85c95cab12ffbfb052fe2f2f62

  • SHA512

    68bb4f809c4d634e74f440ccdc792d90875eda9efd04e98fe72698d631b7d587642498560fa4496e66b2fbe8e377be985c76fc8309883ffde8fc806f52d5908c

  • SSDEEP

    384:GBt7Br5xjL9AgA71FbhvuNBN2TQ1nrdfvf/:W7BlpppARFbhknrdfvf/

Score
9/10

Malware Config

Signatures

  • Renames multiple (3459) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\086e5ba07fdfa8a842b15b3c06b3ab55db434f85c95cab12ffbfb052fe2f2f62.exe
    "C:\Users\Admin\AppData\Local\Temp\086e5ba07fdfa8a842b15b3c06b3ab55db434f85c95cab12ffbfb052fe2f2f62.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2460

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

          Filesize

          44KB

          MD5

          9f2be8e228e225719d7acba003427f0e

          SHA1

          71c9e7775f98e3ca8a206d181297da2176b9560b

          SHA256

          d1abe7137214d475a194328d0716a850c5647dcbded64c61e7ba2df05b3fc6c5

          SHA512

          b4ad3acedae77464ab5634df85589143184e0a57ed854753af84b0fb841232b09a0756a97ed355259609ce4588ba8d758a7459c367a747eab73bca0fbe62d65b

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          53KB

          MD5

          8f2c39a9289424f12922fa0e1940033f

          SHA1

          4338f29392a3d8a83ed97664fb47c4c911cf5849

          SHA256

          b999b3b4f7bdc3ec046fdf0a77aad60ed08a40b496531e18e0e9d02d0cfbfc8b

          SHA512

          6ed50855361b12d320348e681942bcdb498e0ba010bf8378c6dd343b9d6d184f6562eba1d3d7707f91628c7b793b14ba5ed27be4cc31c79e51d8ae1f53f6fcdb