Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 19:54

General

  • Target

    2cba9cff29c0e1e32c3acfdeae79fb21434536d3c955bac29992fafc9e446c6e.exe

  • Size

    40KB

  • MD5

    8a7f01a2e0fcf9aae14b2c2a738c69b5

  • SHA1

    5bdb24fb1a5f7e63e1104022cfdcc0b0b0a8baaf

  • SHA256

    2cba9cff29c0e1e32c3acfdeae79fb21434536d3c955bac29992fafc9e446c6e

  • SHA512

    7f28d3bd55d3d18863d4ae052ffd79bc53b8d46dc4d25bbba0151bcf46a26ba62182b1ed50d5233b4dbff711e1c8e20825664eba79fb6ad3d0749d39ff29abe0

  • SSDEEP

    768:W7BlpppARFbhknrzzA8JQ2AdJCzA8JQ2AdJWX0kXX0k2GsG+:W7ZppApkGpv

Score
9/10

Malware Config

Signatures

  • Renames multiple (3754) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2cba9cff29c0e1e32c3acfdeae79fb21434536d3c955bac29992fafc9e446c6e.exe
    "C:\Users\Admin\AppData\Local\Temp\2cba9cff29c0e1e32c3acfdeae79fb21434536d3c955bac29992fafc9e446c6e.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

    Filesize

    40KB

    MD5

    765d8fd49154953ab10467b6a56d7b02

    SHA1

    7966729464c676de3ad681e2e81df6889fc93a11

    SHA256

    3e75de461d9b2455fc7b723abb4837304bbc8a2981d0f7c1a33d428c0a77c97c

    SHA512

    8582a4b34208dcdf482164d68b6c151f59fead4358af0ec3d2186560b15f0e315efbda39f332ebb496e24a9d534b9955cd27ba96ae3564e57b7cda6cdfdc8c76

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    49KB

    MD5

    1c670b98de60b6208bee9e84f9e1fa26

    SHA1

    782884c9c7404ec5ed1340e3d4f9eec9924501b0

    SHA256

    cbf801eafd9b66dcb53f6c2f6bf7bb3d3db935b3967651ab03409f4457e3a697

    SHA512

    16e603e2d3876b0a4160059b39fe2d0c6f6e83a0fdfe5d59dc75005c9f4d9c3d5784c136839d030b54c495099eac0ee61e4b1862c28c013f265660706e2c7dff