Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 01:35

General

  • Target

    7fce18aa3d8c7a3da81ceffb354a425723b5c6052367b530aa4ca0518f10fc3b.exe

  • Size

    52KB

  • MD5

    a03e43913a4eeffe42fba82afd46204f

  • SHA1

    1ba6fc483909025d003f5e9d5e972df7396e8212

  • SHA256

    7fce18aa3d8c7a3da81ceffb354a425723b5c6052367b530aa4ca0518f10fc3b

  • SHA512

    7c65b8e7087635c8279d4bc67fcb09e2bb4eb6d5eb96486ef0eaf2c84e510a22112d82225e73150fe0cde63ad1f51cab026924b1d3a70bd1603c77d2cade9125

  • SSDEEP

    1536:W7ZhA7pApVGdsGagj/NQdsGagj/Nyv46Ov46tTItTIE:6e7WpVRTItTIE

Score
9/10

Malware Config

Signatures

  • Renames multiple (3705) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7fce18aa3d8c7a3da81ceffb354a425723b5c6052367b530aa4ca0518f10fc3b.exe
    "C:\Users\Admin\AppData\Local\Temp\7fce18aa3d8c7a3da81ceffb354a425723b5c6052367b530aa4ca0518f10fc3b.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2380

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

          Filesize

          52KB

          MD5

          01255b4be550557b11cad971c155edd3

          SHA1

          d77e61ab0f2df62ca3dd7253db8af80651d70288

          SHA256

          0dab37bfd352abbac04d1b83027e96ecaecfaf9baf5054240b263f2d96c9a939

          SHA512

          c6ffdd7cfa6eebc7b2285ab67d95fde75885bf281a8a37ae75218e8a3287dbd4e3cc1ffedd1fc5388bf5dcdfaca8d0450b9b3041fc2def0922e384f6a770f399

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          61KB

          MD5

          6170153e6d589a2c55b3046ca2eccb3d

          SHA1

          a42b2074e35229ec62a9fd973eaff2886f71d76e

          SHA256

          5c4e0bdc3c830cf5770731c606a35abfc336430bd272f22f4624e945131b64f0

          SHA512

          bfbc7d25aa6305e65c1cc2d8c0bf37ff6afbc8ee2d0d2faffea1e014b3f9f30d7b59d22fa5d89e5276304362c019b5a8f299e7bfe3f8639daa6d01887c8953a8