Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    03/08/2024, 05:19

General

  • Target

    f96c2f78a0a16561f8efecd83998e8496976584b18c6d8299572e7a77243a469.exe

  • Size

    37KB

  • MD5

    edf1d402e90437214c83932626371bb7

  • SHA1

    3519acc63c888a9a11cd5ea256f3dfe9614b909e

  • SHA256

    f96c2f78a0a16561f8efecd83998e8496976584b18c6d8299572e7a77243a469

  • SHA512

    593a122c5d28459ebfadccb666e30fb5c86c81c0cfe79a9fe66d21d521b4f166b69271e4e520009b9a2c10693d4a9fdc4f5569098310f0816e2fccae368ca61a

  • SSDEEP

    384:yBs7Br5xjL8AgA71Fbhv/FzzwzYlzGAlzGY:/7BlpQpARFbhNIAGoGY

Score
9/10

Malware Config

Signatures

  • Renames multiple (1170) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f96c2f78a0a16561f8efecd83998e8496976584b18c6d8299572e7a77243a469.exe
    "C:\Users\Admin\AppData\Local\Temp\f96c2f78a0a16561f8efecd83998e8496976584b18c6d8299572e7a77243a469.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

    Filesize

    37KB

    MD5

    7844f19b6c7d9e57433a9db52bb57fe6

    SHA1

    5d4b0056870d85c00e54761ddea526b5be5525a9

    SHA256

    85d9c1c6e170d72ca48703aa5a25cfac4a975261e3c6266d6bfd4ae8924cc3ad

    SHA512

    447a40360a95662677cb68003edc264cbc1561ba172f6ab0e4cba8c736632f63046f12f83d89895a53e3e8f9c79cd60492591d7dc8418e766bada924db1364a5

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    46KB

    MD5

    936725ef695fa29d0d13a3cc23b21bc0

    SHA1

    ea2960aad7d1d3d37cfef65c61eeaa04e81dc2e1

    SHA256

    778877fe53e5060a01b337a24796eda47bf1edc592a4988e03eea6238305ec66

    SHA512

    34725de04d77356f6d287b5824d257a9ac235e60cc29ece04721128a7082d9c8abf2c620c7e94fcda48dc50057ca08ee31bbd97bd3a3b131bf15ecb38328289e

  • memory/2596-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2596-70-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB