Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26-07-2024 03:57

General

  • Target

    d534aa91ca5809c844c7e71905c2f7a7d9b59206931323c74bf6d6e76e1d62dc.exe

  • Size

    55KB

  • MD5

    24fec01ded1263c05ff218dbe14320c8

  • SHA1

    21c6a52b20d9144afcc605e73d9ec0c89b5ba7f5

  • SHA256

    d534aa91ca5809c844c7e71905c2f7a7d9b59206931323c74bf6d6e76e1d62dc

  • SHA512

    1867cdd3a9c3b3194a4c0c2c1b85cd4c1a703dc9134aa0776b73af7228804e7a29d536b1e4c61514bc9be8dce1d7588a7f5ea0ea5ef2af463af2d8c5360ccc8a

  • SSDEEP

    768:W7BlpNLpARFbhblkYlkuvIYFdxyJLxNmUgbLf24LxNmUgbLf26:W7ZNLpApCZuvIYXKtNsO4tNsO6

Score
9/10

Malware Config

Signatures

  • Renames multiple (3266) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d534aa91ca5809c844c7e71905c2f7a7d9b59206931323c74bf6d6e76e1d62dc.exe
    "C:\Users\Admin\AppData\Local\Temp\d534aa91ca5809c844c7e71905c2f7a7d9b59206931323c74bf6d6e76e1d62dc.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    56KB

    MD5

    aafd329efd8425935d07bdb01fdca26d

    SHA1

    afe21709624aac2fe8ec477c9d6e22f11edff9cd

    SHA256

    0b191a893d8096703234031555c828b8b00e72d94752a316735993284d8f8a6d

    SHA512

    6e1776d721b8c7b623133790c21e442beea61f55133d9c4b484871aa48e3119873c0594c1ee957489c2f4838c60a477ba37f8543490ba29f8e183896c1cd6f13

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    64KB

    MD5

    0eb02bd91464877ad5dcd3e919b9d4e0

    SHA1

    2cf9b63fb9e8db36c41da41606d8ea11a5ab8bb8

    SHA256

    44f06d20645cd3efc7dc4c2700932672e771cc318e2814b710168b4fd11e380d

    SHA512

    ad0dccb19e368b774d628e6c33a49ca2ef3ff4e4d502210fd183241a97b8e212263e2aa2541e24eac41a08d67d7e216263266f139984fd1ff51c6e9335f41387