Analysis

  • max time kernel
    149s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    27-07-2024 20:18

General

  • Target

    2647230755e024688461d9356b48675c13784ef059fe79e53cfb82b7e19b94d1.exe

  • Size

    82KB

  • MD5

    263e5d8f0848ea1bd67be4b404964f28

  • SHA1

    815b8dc9882c8f5ed1c5bc6efa34a6309ff2892b

  • SHA256

    2647230755e024688461d9356b48675c13784ef059fe79e53cfb82b7e19b94d1

  • SHA512

    c7b4190116af4ad57bc620cf5317118cd03b56eb254d71c3e8a42724d2a717d018c616da67effacbb422fd641a816ab8d339787159334e2c3e075b6d5207b02a

  • SSDEEP

    1536:W7ZppApUFpEhLfyBtPf50FWkFpPDze/qFsxEhLfyBtPf50FWkFpPDze/qFsAcEhx:6pWpUFpEhLfyBtPf50FWkFpPDze/qFs4

Score
9/10

Malware Config

Signatures

  • Renames multiple (1356) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2647230755e024688461d9356b48675c13784ef059fe79e53cfb82b7e19b94d1.exe
    "C:\Users\Admin\AppData\Local\Temp\2647230755e024688461d9356b48675c13784ef059fe79e53cfb82b7e19b94d1.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

    Filesize

    83KB

    MD5

    019b14858b12a65002f85a3c94819db5

    SHA1

    fdd31cbe1c58073fa4e1049dd0b46a86e36448f2

    SHA256

    9112e8dc39f056e9472c4dd896385759b393676384ae264ac89b30e13d6105fe

    SHA512

    4a406545ffc7ca51020e63cf2085f07a8ac0d7bd048a555a9ee6440c388c1d34a3e73fa322691fcb9ca86b38c018023f46142679ad6cb5fdfef77eb344646530

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    92KB

    MD5

    b55120597f0f8129193e9c582f7a5375

    SHA1

    6c2136aed464c44615f0cc018f48cb5e466b4be9

    SHA256

    e0a3d071d6a4a9d30286d0858901875237efb46663db57ce0d5ab7279d2d48bf

    SHA512

    6c60e4f20968b64094a047894d414760eb227678d9fd1a5188081e3aa65301911005aab0d76607534b07790562bc9e28c11e81cb54f310aac424d30d7eb85fc7