Analysis

  • max time kernel
    150s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 18:23

General

  • Target

    0722efb5c3aa49959d9a8ff67b8f2a4f261651e12c8f4eb9858cd25a398e566a.exe

  • Size

    60KB

  • MD5

    ec98139b86b3cc47351f06647a3c0c2a

  • SHA1

    0cfd225e43d091de141b66375cb4f547b107af42

  • SHA256

    0722efb5c3aa49959d9a8ff67b8f2a4f261651e12c8f4eb9858cd25a398e566a

  • SHA512

    606038429128e3e3eea8aef5291bdf09c277a423209c6f87f56760fa9dd905e634750df7132f205041f9aa08cfb401eef4b2af0fccaadfcc203e25b870efcd51

  • SSDEEP

    768:p7BlphA7dASbS+m0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM97:p7ZhA7dAp1++PJHJXA/OsIZfzc3/Q8p

Score
9/10

Malware Config

Signatures

  • Renames multiple (780) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0722efb5c3aa49959d9a8ff67b8f2a4f261651e12c8f4eb9858cd25a398e566a.exe
    "C:\Users\Admin\AppData\Local\Temp\0722efb5c3aa49959d9a8ff67b8f2a4f261651e12c8f4eb9858cd25a398e566a.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2348

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

          Filesize

          61KB

          MD5

          d71519f0907d1a36da8aea0a27a9d10e

          SHA1

          ac280710d9f57c960b760d040588a11fc22c3911

          SHA256

          26c9864fad508e657b715249ac10951422136f766088c4770fc572ff08c20073

          SHA512

          b4b4d1693d209c7373dfbfcffd4800c8d49a88b423446d4c6734524b7c8a8902681b274519e0c1350ac1b3e503f4ab15a47798b03ffa4903f59108e015321eda

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          70KB

          MD5

          77277c6df3c5e2299db5f3557f2007ed

          SHA1

          980dc10da3c1b96a6f939f247d5b9ca8faf175bc

          SHA256

          4711876345c29d3cf8e6d5b6d362f3a181718661221a0402ae2f8e160f878a07

          SHA512

          82cebb97b910ec45b9ea33bdd2d7b3adb987188a0d4dd968834a4779460b67251600816bb7a7aefe6b03a1ae504405092e1f618dfdb55398bf47f7477897c5d7