Analysis

  • max time kernel
    149s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    28/07/2024, 01:41

General

  • Target

    93cd4ce7429eca013c7b0856501b8917a9215a6d1cbbc15f8512f5afe52302c4.exe

  • Size

    57KB

  • MD5

    812d9656a226668be8692ae87ac9f884

  • SHA1

    d2299878eed8848aa7a4929a0eb2f7e3d1e1f055

  • SHA256

    93cd4ce7429eca013c7b0856501b8917a9215a6d1cbbc15f8512f5afe52302c4

  • SHA512

    384da52552f0e8374cfe35d72a01a6f12368bf4ad9d0465146b5468ea9051dacbff9a6c0af435f847e257d7d20c7d8115bb8ef091b790af1b054c09fc2356cc7

  • SSDEEP

    768:W7BlpppARFbhwEnAAJ+AAJ9vcYNnVvcYNnfy7/B3bG3bd:W7ZppApwEk7n97nI45

Score
9/10

Malware Config

Signatures

  • Renames multiple (2032) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\93cd4ce7429eca013c7b0856501b8917a9215a6d1cbbc15f8512f5afe52302c4.exe
    "C:\Users\Admin\AppData\Local\Temp\93cd4ce7429eca013c7b0856501b8917a9215a6d1cbbc15f8512f5afe52302c4.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini.tmp

    Filesize

    57KB

    MD5

    18e6211bbd1983e37ffecb1704c5816c

    SHA1

    e371a676d3959d56959f7c7b7e6d836e18442e9c

    SHA256

    3b79bfbf4bbb490804021846ef68dc5250ae8a1f52e88a26fd6bf7ea38d187aa

    SHA512

    afed19a285cfb8e11f0c95250c8b0008497299a193ce76554a7ed740d658248ef4e454d34b1567174457233aeeeaa713a59f80796470eb4dcb2137f273ef6722

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    66KB

    MD5

    9a0784d869cc2918911a93780444ab53

    SHA1

    f39c5833a82381205501eaddab440bcc4c98db2c

    SHA256

    378e82777d00164c56b3b013e93a459eb1fca888431fb2396d82bca100aa3a63

    SHA512

    b2da383787a68a355f66ee3cfd0de9a5f9096752ecbe1e4ace3bf14ce8e2f28653179bc3b68f8515966be0c6a7dd410e536d161cdada7835370b76abcd718733