Analysis

  • max time kernel
    150s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 06:24

General

  • Target

    e88f41a124d9585698f1c208b35a68fb9b1caaab4ef63c0414bc98d065cf8f16.exe

  • Size

    88KB

  • MD5

    0c7df236b5b8aacba66f83edd491a546

  • SHA1

    e6c5f0b0943edaa0453eb7985d18b116a4d4c0fd

  • SHA256

    e88f41a124d9585698f1c208b35a68fb9b1caaab4ef63c0414bc98d065cf8f16

  • SHA512

    4e711156474b49b30e7760eb8ac11b8a7203e3cf537fbf05a1a0d91eb0549c9d3dd858e60a201feaf3f472779caeb9b1668b78013ebccfd65fab99a3878b8411

  • SSDEEP

    1536:W7ZhA7pApMaxB4b0CYJ97lEVqNR7Yge+ejy0Wjy0WzYAMO:6e7WpMaxeb0CYJ97lEYNR73e+eGGrMO

Score
9/10

Malware Config

Signatures

  • Renames multiple (3518) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e88f41a124d9585698f1c208b35a68fb9b1caaab4ef63c0414bc98d065cf8f16.exe
    "C:\Users\Admin\AppData\Local\Temp\e88f41a124d9585698f1c208b35a68fb9b1caaab4ef63c0414bc98d065cf8f16.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1292

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    88KB

    MD5

    4248be0c7a676a61468da4dcaef8d8a8

    SHA1

    e08fcd32e23fe49f572660029806370139135306

    SHA256

    893775a35a0d328e69d34a7281362c5208fb933b23cb75b2dcfc26a022859ff2

    SHA512

    c3e4f97ce11a74e3848f09d4b91b010012a42244e21f714a73eca76fb07b752037902cb379e6a0dd94b74d1822911cd9e908428f92fd4dec5e40809fdcb3f4b0

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    97KB

    MD5

    08ea53c01cd2c4e3f765222d1a94fbd4

    SHA1

    735bb8ea5df9ff1e9812d0366258fc4f5b9b79ac

    SHA256

    83712324d77c2094c1a035126d854eb272a19999a2ab65e17d4b87b81b8d9f6b

    SHA512

    523f5ebf0a533e2014ef36bda528bd507219f09b6458495172a4f3ac683ddf2962d7287cbbc869ada01b1a5ceca8b0c9fdd2af839b119bba698ff53728c92e51