Resubmissions

26-07-2024 18:13

240726-wt3ltsyhla 9

26-07-2024 18:07

240726-wqpwkavgmk 9

Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26-07-2024 18:07

General

  • Target

    01945f8973c0f2ecccf5adbbb8680cf1b359c1f55158597953254ca0d39e98e5.exe

  • Size

    76KB

  • MD5

    a5e304adfddfc62a9de7aaaa94e96812

  • SHA1

    18e1d5d16d3882917d151a43c437af87cce9c58b

  • SHA256

    01945f8973c0f2ecccf5adbbb8680cf1b359c1f55158597953254ca0d39e98e5

  • SHA512

    76ebd68318519805c205480c07d8fa03ab767f8f54acdb70f0434b76ad744fa1736e43d62c2758536c510cf508b6bbea7d217a5167594b98b67c9c704a5ca492

  • SSDEEP

    768:W7Blp+pARFbhtlmlQ3y3RWvf+wi1x9f+wi1xBTCcX8vgCcX8vSd5hdx8M8YA7B7S:W7Z+pApfGQ3y3RWvfmRfm9sKsSd5gYv

Score
9/10

Malware Config

Signatures

  • Renames multiple (3077) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\01945f8973c0f2ecccf5adbbb8680cf1b359c1f55158597953254ca0d39e98e5.exe
    "C:\Users\Admin\AppData\Local\Temp\01945f8973c0f2ecccf5adbbb8680cf1b359c1f55158597953254ca0d39e98e5.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

    Filesize

    76KB

    MD5

    225ac9dfed96465c078e100b8e7acead

    SHA1

    6afa98824057fdaf165f946c4426518aa54f4f84

    SHA256

    1a590375b456599e929a434d0ac72a3ea3c48b658225893ae12a0aad5979842f

    SHA512

    da8fae91e4584d2c8dd0ed613d5fdd05b225a303c692816a28fb6373ecb43a5a2c67ace97e54154e7c715ea89779d4f4f8a32ebeb367a271505a6100fd1db9cd

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    85KB

    MD5

    d861d10bcc1864dd8ab6c8c80b8cf5b6

    SHA1

    4d4ca927a61219d974fe97965809acda8faa1b9b

    SHA256

    5b5bee2fb0148ab18df1168c66157703da447a5f0cf6dab829fbda96db33319c

    SHA512

    361576c38e071ad81ee5cff182eb69af255a00d157701f94a6f861e9f149041693f53a3f10a11c50a1e33acdd914012ea1f83f73052104087038ca005d9ab5df