Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 19:03

General

  • Target

    1676093a2107ebbd16b1cd90eb55c56cfa53008b6a5bbb9e1bf495aaa4cf1fe4.exe

  • Size

    99KB

  • MD5

    0f49d23cbe24f653294e5cd08c4c8a49

  • SHA1

    1be53840e050e8384f03fcd3961718e8674497bd

  • SHA256

    1676093a2107ebbd16b1cd90eb55c56cfa53008b6a5bbb9e1bf495aaa4cf1fe4

  • SHA512

    d47b17168aa24a327c3649b3ca6148a4b513f338812e583b40d408853dfdb6e2274ab1650c8416535cb90390525ad5d6deab1b79b68bedc6885a6eb52959bf5a

  • SSDEEP

    3072:6e7WpMaxeb0CYJ97lEYNR73e+eKZOf7ff:RqKvb0CYJ973e+eKZOf7ff

Score
9/10

Malware Config

Signatures

  • Renames multiple (2994) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1676093a2107ebbd16b1cd90eb55c56cfa53008b6a5bbb9e1bf495aaa4cf1fe4.exe
    "C:\Users\Admin\AppData\Local\Temp\1676093a2107ebbd16b1cd90eb55c56cfa53008b6a5bbb9e1bf495aaa4cf1fe4.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1200

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

          Filesize

          99KB

          MD5

          d13e79f9ab13288459139d7274eee572

          SHA1

          55f21ed482b872cfbd819379686c44f558d1091d

          SHA256

          d66c32caf53d4e834c8e49f890880312f94980c16585092f0ea5ff7b803142f5

          SHA512

          aa3dcd4720a6e738ef556c57f18f51a60bda489630874fe52f6102af7d8cddb0401d039819419ac22336630c41b148eaa826cfe6499aa334cb6da096c2cfb65c

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          108KB

          MD5

          5f4f91e0605057fd8d251e9a3ff254fd

          SHA1

          bf6764cf05366b444bc2faaadb3246765106d06d

          SHA256

          6efe4ad03ec9e81d5bab4dc31bff70a3c60728237e9e51a1a1e15ebc5f14c07d

          SHA512

          c30d5e12b17fa0320913e74564a4d68a6cd84c504aae6a4a3a47f7883d51cc7c9c28579c0b8e45f54325428c6f2a37c149c15aec7a800a4a887727e065346ce0