Analysis

  • max time kernel
    150s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 04:34

General

  • Target

    c0180213f903900b0f7bdbd417f599fc1cd924f4502152ef3e340e329fb28088.exe

  • Size

    34KB

  • MD5

    09ff0b488a5982f67b61e99b7bcdf71d

  • SHA1

    84bd9e5c37f4b5e5daedcbe578a78853182cca4b

  • SHA256

    c0180213f903900b0f7bdbd417f599fc1cd924f4502152ef3e340e329fb28088

  • SHA512

    27a0d00f467f14d62cee95f24cf89a44a4a2e5cdf7ed7b72752d053c841c3be095044cdb7aeab0c3de73466318acc14c745a6c7ed47627db22297540742718df

  • SSDEEP

    192:pACU3DIY0Br5xjL/EAgAQmP1oynLb22vB7m/FJHo7m/FJHhpqOkPk9:yBs7Br5xjL8AgA71FbhvsGs9

Score
9/10

Malware Config

Signatures

  • Renames multiple (1345) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0180213f903900b0f7bdbd417f599fc1cd924f4502152ef3e340e329fb28088.exe
    "C:\Users\Admin\AppData\Local\Temp\c0180213f903900b0f7bdbd417f599fc1cd924f4502152ef3e340e329fb28088.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2564

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

          Filesize

          34KB

          MD5

          537dca90e949205115156bbf8256f526

          SHA1

          2e77608ab12226215c4437ae88e766dc855a576f

          SHA256

          bc5e8eada75969942bca8b91f35a84409c343f5f4cc46fdb58e266c96c6d2c30

          SHA512

          1a12d09d90a4f07e9bc066b39894819704b6b0cf5f6891a9273b654867654a894bf5db6167e75d9dc0c6e41ff71a62c4197e6e88e988fedf91aa2774c5471f42

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          43KB

          MD5

          e3a37512d8c63b70b11c774fccce7c31

          SHA1

          15a98f0b1f97f3909e4fa2418182c1af555e04f1

          SHA256

          5e1f88b2621207849a8d7c1106b819dfddf6645f480952661829f60e2f9bb17c

          SHA512

          4560530383280b884400b9f55db8441f22e1b1c8db9b3623b14ffa12ab45b7fcc4930df29c02292ae272511dcddc4c43db9b8fd1681bdb2eb299312392a5ccf7

        • memory/2564-0-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/2564-74-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB