Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01-08-2024 21:17

General

  • Target

    22c5298efa613da5b27d57ff527a2f32c8c36632c18478ca1e032aa6366a68af.exe

  • Size

    48KB

  • MD5

    f79edba4b58c43ae6991cb41c8e80f71

  • SHA1

    4a37855a8fb7c266dae3559edf8405fd380ca0df

  • SHA256

    22c5298efa613da5b27d57ff527a2f32c8c36632c18478ca1e032aa6366a68af

  • SHA512

    0afa7c500e9f1d37b32693115f1552f7d9a7b200496196e2c248a191190a956175be900d635b2e78579ea40027967ba4ca07dcb79754908447de325220d841a3

  • SSDEEP

    768:W7BlpppARFbhHFoqAJwBqAJwRJofJoToYkGiG+:W7ZppApaJofJo8Yk

Score
9/10

Malware Config

Signatures

  • Renames multiple (3880) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\22c5298efa613da5b27d57ff527a2f32c8c36632c18478ca1e032aa6366a68af.exe
    "C:\Users\Admin\AppData\Local\Temp\22c5298efa613da5b27d57ff527a2f32c8c36632c18478ca1e032aa6366a68af.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    49KB

    MD5

    605aeb0f76c094da845054d096a56999

    SHA1

    844e4607e062dd0f8c9b0f3e85cc1d6ca9564547

    SHA256

    6228265c1fdb8b91add21dfa2d01b318751d3b8659cf951f87acb3edd0d1e560

    SHA512

    35e4d45ec8d2413d05fb76a524ae1167f9d021d2986f2ca79fce71e4d4077ebc162e983cb08cb96cb0f9fe88f424d175cc37e47662f9d0223a251be3c89aaf18

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    58KB

    MD5

    da4e239559f349ce016809c69aabdf8f

    SHA1

    a31c3870ff5addb7bc5361513be0127e008fa01e

    SHA256

    0a79074a02daa4440825b48fd85c536fce0ef8eaf52a28a3d6871b904ccfd1dc

    SHA512

    23753bd48988b8b54c7c3883635ee590545ce4ac2125fc1275d8a9ad1ff5272d8aa451c6b5ef71841ecc34ac8cf5ef0fb8adf42240f7d6365b92b76a32d964d5