Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25-07-2024 19:15

General

  • Target

    1b2789cd1b3965ddaeedf82b4bc82e97a9f22912669a4f82730e6add86a89577.exe

  • Size

    42KB

  • MD5

    be9121da8b3e1fbc74b5b1d212f4f37d

  • SHA1

    c25af461f44fdcbbc50d7678b5bac22e26134f0e

  • SHA256

    1b2789cd1b3965ddaeedf82b4bc82e97a9f22912669a4f82730e6add86a89577

  • SHA512

    d03e3ea37985b2d63792763222702c162f6cb8d041926c6871a5b8bb25894fc447811ad558c8ec9a6e215cd47a82896ce87f072b1badfa32a6eeadf0ab38b191

  • SSDEEP

    768:W7BlpppARFbhHFoqAJwBqAJw1VyjVyokxlfle:W7ZppApyVyjVyftk

Score
9/10

Malware Config

Signatures

  • Renames multiple (3714) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b2789cd1b3965ddaeedf82b4bc82e97a9f22912669a4f82730e6add86a89577.exe
    "C:\Users\Admin\AppData\Local\Temp\1b2789cd1b3965ddaeedf82b4bc82e97a9f22912669a4f82730e6add86a89577.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    43KB

    MD5

    7cb59a944046ff44db5fbeb6c5027a61

    SHA1

    12c4e35a181b643f358f649e5627486ef6398a6c

    SHA256

    4bc6ddca2f3bae5c0325aa4a55c0be4b2646a436391a18c0c1e569ea31dbb390

    SHA512

    231f4c44a7aac91f27066bebfe21ac582b65c813284dfbde5c133f3ea3f518ab9ee91084ccdc4f805e88dc1eb0cb3b909dca48859fa08bc73a6ea4e9fd5d3de5

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    52KB

    MD5

    6d8ece556963b4cb209f3e72bc37114e

    SHA1

    aa3aa4157e275a7e7b1db7d3f71aa36753348c1f

    SHA256

    93d574354947618b8d83804ff3500240c5967a2593973067deb0a6712e018027

    SHA512

    1592c9b66fb3fb3a12fbefaa77e6e63fe8a5453a43b3c9fe0c0414fe0523ae352869de962f9b8bb79dd510d8771400e6f9e69a5844b44a85a58b1f14d58e86ad