Analysis

  • max time kernel
    150s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02-08-2024 02:37

General

  • Target

    986bda01935e6142f2c387c76349925f78230f05c14bb75e6c77591f759c1b34.exe

  • Size

    82KB

  • MD5

    f9ee1e38b2f7b3656284709bd363c23c

  • SHA1

    42b25b02972b7228b9d45f25cc5fd75678e18ddb

  • SHA256

    986bda01935e6142f2c387c76349925f78230f05c14bb75e6c77591f759c1b34

  • SHA512

    20105ce94eab649bc97561b84e4bbf4112995b7aacd53a8d7ff2c92e6969331af8fb2aa426125a5687893aeb11923be1bc5013b96730c49cead3b8519a9595a7

  • SSDEEP

    768:W7BlpDpARFbhYQkQjjIXYvPXzWPXzK3733uF4V7en5c5HChCrmhWfxRfxenTs:W7ZDpApYbWjIoPyPoLzV7c6ShWfxRfxR

Score
9/10

Malware Config

Signatures

  • Renames multiple (509) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\986bda01935e6142f2c387c76349925f78230f05c14bb75e6c77591f759c1b34.exe
    "C:\Users\Admin\AppData\Local\Temp\986bda01935e6142f2c387c76349925f78230f05c14bb75e6c77591f759c1b34.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

    Filesize

    83KB

    MD5

    22be79e76a5f358e8d4f67698f2af743

    SHA1

    5bdf9a44d98d16cb7d2e3c2b5056b9f953ecc634

    SHA256

    999e8ee2f474d023facc22a3f67c611ce1028ae0caf1f8bbe0a09ee9316e016a

    SHA512

    87b85a3888c7d01999ec220abd70d582b7853361f51b0e4265e95a5edac0a3a2b87b00b6a76d0a6860531fc748ce068cd7947157a34f4e7aa2e568acd16453de

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    92KB

    MD5

    aca5e63e35515c2e45845f9490552434

    SHA1

    2bed260ecfb6086c6a9a3b48d1301a37ca60610d

    SHA256

    69da78e7f22f16f52993069c512fe1ed1b98da7bde1b1f92ad0853718598206a

    SHA512

    a30f2e3387b0fcbef8ae64bac23ef4e7edc63657c27f66358db09f5e626f4df33cd1379e8e9c2c66533b9fa7f0464b724761bb8f39516953a1c7405963daec72