Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 23:27

General

  • Target

    6a0f16fdabac998160206031bafbf950N.exe

  • Size

    70KB

  • MD5

    6a0f16fdabac998160206031bafbf950

  • SHA1

    b9abecb5c5e94b71101418fd6b7aab45c5cfa608

  • SHA256

    9638c8ffdecd58cb1cdba1889922821b5774e93d4ad187267651526dc51effbd

  • SHA512

    bd20bb9a22fe7c63139e620b27c837e1460a4c4bd5175c204c4c8516623dc639334b343f52f8c5cf3d05f1d21f0904ca9ad0eae3e89c8f2322870004ddeb8982

  • SSDEEP

    1536:p7ZhA7dAp1++PJHJXA/OsIZfzc3/Q8Ue+bs:Te76WQSotbs

Score
9/10

Malware Config

Signatures

  • Renames multiple (2697) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a0f16fdabac998160206031bafbf950N.exe
    "C:\Users\Admin\AppData\Local\Temp\6a0f16fdabac998160206031bafbf950N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    70KB

    MD5

    d90c2ee547a8a937240f89c2c7ff507f

    SHA1

    8a6c11835a34198271d1211fdfef964aad8aeaca

    SHA256

    56c77c9d1db8ec2b4d6d8b834665cd0e8d8e8658d2a6a34606e8f813aa0d85d8

    SHA512

    a4d2c1d467e3f1731080c0fa171bc735fc97e8c95203385441d42165a67fbd194a9aa08fb1da069d11a370369286f80a6fd02138a625a0a3f9f8ee71aab112be

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    79KB

    MD5

    483bdf1edd8785ee1f9ec2950ab05332

    SHA1

    1ddb0786bae60f45087b1a717a02d12c5a2e9b52

    SHA256

    3028a1ea869f1f485f2329e862a88ba7f24e78d4b189b1c9d46d8d8996aaf67a

    SHA512

    2f20646adad26df34777200098cf191e69537c2a86913d05f4c95ef2622114318d527484a26135320e5923d34e899a2392cc366c1b656a068a2057b3ae91a374