Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    01/08/2024, 23:34

General

  • Target

    55bbdd1ea10c2b8042c1807dadf1b323d78505bfffe6d94bbf86bcfbdf930c34.exe

  • Size

    55KB

  • MD5

    225360c3082f173166671a483be3b1cf

  • SHA1

    d5eee5829f8eb0d48742117c867a6302b824c517

  • SHA256

    55bbdd1ea10c2b8042c1807dadf1b323d78505bfffe6d94bbf86bcfbdf930c34

  • SHA512

    2cba619212d7a3ea94778dfa5ac1e1f8d2d13312dd9a130a4036c6a047207bf94a83f0331ec09089ed73d7d81ced1ab93f9187361f9527d8410f854b907a5860

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfpVF/MF/3Nw/Nwk0cEMdV8IEMdV85/I:W7ZppApBULcfpHLcfpX2/Nw/Nwmx7

Score
9/10

Malware Config

Signatures

  • Renames multiple (3784) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\55bbdd1ea10c2b8042c1807dadf1b323d78505bfffe6d94bbf86bcfbdf930c34.exe
    "C:\Users\Admin\AppData\Local\Temp\55bbdd1ea10c2b8042c1807dadf1b323d78505bfffe6d94bbf86bcfbdf930c34.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

    Filesize

    56KB

    MD5

    4fedf8a2a2d099a3f439c95c79814cca

    SHA1

    29618ad94ec4786afb1fa5adcbac7dc5d94548c7

    SHA256

    ae5a07fc69c7a4345ce5abf34c7f6dd4f43165b816106ede5abe359a7ff4a03e

    SHA512

    4dd876fb651c0778ac45f2f2de618c58fbcee95189c590dcc88e127a036c4de258db4f4b57b67f3328e6a0d318ad20e9d96bac54684e46b593484072862837e4

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    65KB

    MD5

    25f2137fa5f9afea5d28c1935fc4dc1d

    SHA1

    f3399daec5f91dc6d759bace44b2e583e318f0cf

    SHA256

    7f531f728df413d9ca8f7b0d05ec52e01396b2b874d45093171b1e48a2e07a4a

    SHA512

    f9e1eb92a7bb87683e6ba3ae515d277fb771a08ff2fbbd90e3e726746c05fbfa275d9de8661c65762d2660d58181701764dcb026d8224f32d48f07f7a457a7e0