Analysis

  • max time kernel
    149s
  • max time network
    21s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    27-07-2024 21:44

General

  • Target

    46d216d2dd82e6d71273535df04747cfecc37ae100822dca50290dcd7eb858fa.exe

  • Size

    97KB

  • MD5

    cf37d9030308abe36d5e01456893a920

  • SHA1

    e0c20107e2dbeaf1ba365c8693592cce4b825fc1

  • SHA256

    46d216d2dd82e6d71273535df04747cfecc37ae100822dca50290dcd7eb858fa

  • SHA512

    7981b5428025a70ab229f47566a714a48509003faad0527fa033b8feedb254491e1f46cc124fa185c7678ad4a9788b240acb7e17fdd8bdc83ef0e793209f9857

  • SSDEEP

    3072:6pWpUFpEhLfyBtPf50FWkFpPDze/qFsxEhLfyBtPf50FWkFpPDze/qFslEhLfyBt:PqFF2Ie+effyL

Score
9/10

Malware Config

Signatures

  • Renames multiple (339) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\46d216d2dd82e6d71273535df04747cfecc37ae100822dca50290dcd7eb858fa.exe
    "C:\Users\Admin\AppData\Local\Temp\46d216d2dd82e6d71273535df04747cfecc37ae100822dca50290dcd7eb858fa.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

    Filesize

    98KB

    MD5

    afda0b02acca4aeddb269a993126a254

    SHA1

    70205f21898055b03e45e4595518cd2d7b075dc9

    SHA256

    40cc6bbd0819f066de71167623567deb623fc50f77d6833210aae8df3c2972bb

    SHA512

    facdb8662982e7b446abcfaca73ceb26a9a11ff6c47bd8b61de80acaeb65277527126171369427cb0ae7ab8204919c5728e38279f96eda4e635412cac0a4648f

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    106KB

    MD5

    e68f5432ac31a65e2708ea3bf50b9899

    SHA1

    16d7f05c3c4a9f5566da6f84e80e652500332a5c

    SHA256

    a13fcc99f94048afa9c283da10a1003a452338046fddcfb4162f1dbb0161e2cf

    SHA512

    d55fef544c3a06850b1da4d5f081636415f8f0230b2af47f2274ba5133bf2e1f51e7bf7ddc670f1856e3f1d0da3b772db9f9e37239f69f17218d28f926b88771