Analysis

  • max time kernel
    149s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01-08-2024 21:35

General

  • Target

    26a90f36b8c8521260b85814fa6f84b227ae268b2e21f1914ee752669131580c.exe

  • Size

    33KB

  • MD5

    ff9ecbec0ceaedba8084ea41223505e6

  • SHA1

    813f4e050811f54eb8e04f0592a73bc65075c444

  • SHA256

    26a90f36b8c8521260b85814fa6f84b227ae268b2e21f1914ee752669131580c

  • SHA512

    255136888576292f6008ff37f64c5392e9bd5360d4dce639387428603de80f67f031e2fff7bd7f8997e35095af4929ac2264d8e42ccd823e7d529f367b37cd7f

  • SSDEEP

    192:pACU3DIY0Br5xjL/EAgAQmP1oynLb22vB7m/FJHo7m/FJHhpqSwnwp:yBs7Br5xjL8AgA71Fbhvsdwnwp

Score
9/10

Malware Config

Signatures

  • Renames multiple (3797) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\26a90f36b8c8521260b85814fa6f84b227ae268b2e21f1914ee752669131580c.exe
    "C:\Users\Admin\AppData\Local\Temp\26a90f36b8c8521260b85814fa6f84b227ae268b2e21f1914ee752669131580c.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    33KB

    MD5

    9d01247fb9942f0cfd21fabf245d5e9e

    SHA1

    95587c28072b24a9e5dac049649310585ca5c2d3

    SHA256

    d313d44afc09178ecf8252facea93e10bd4f06e5a76edace362351e7cdcf82ab

    SHA512

    171b33ab9d5526eab4a94a4c1ee1d1874a0eaf13c1863b85ecd6b66a28c6fc79ea80fd2dc371abaaefaf379a28ac46cc87a0d74dfce2c52859e7d801a8da5abc

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    42KB

    MD5

    c1d2d5dc4acbfe4dcd89343a945201d7

    SHA1

    bf863151bdae9ae3ad8ca0b8bdcd924c01315400

    SHA256

    c1d35b20b6df8655120ca647d0b245b48363df19fac0347bead5c4f6d4589055

    SHA512

    10e708d81e0b3b1b945e72dd7f93aa4d746e6d6cc9605d71e2f39091b68c68f308a019abab7ebc3f78d74b3df266fb3852a661ae2c4398f99eab79394800b205

  • memory/1932-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1932-668-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB