Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    05-08-2024 22:36

General

  • Target

    6a26ccea8300f4a6078a589fc60bde5e366d6aa1b05a5652fa475be0c282ebb1.exe

  • Size

    57KB

  • MD5

    85680a847cdcfd4914f44e0f4d0f4baa

  • SHA1

    d91fe085636624a37633e2e8b242ba2ee8b58474

  • SHA256

    6a26ccea8300f4a6078a589fc60bde5e366d6aa1b05a5652fa475be0c282ebb1

  • SHA512

    c4177886c695a5f2f9e068a1a755d24fdf62211f52fd91837e15e92cc908de320c5b919b8afa3279eb9f9ecbdb460ce3f59bdb48ec47457f22ec185c9abcd8b6

  • SSDEEP

    768:W7BlprpARFbhJ68nNIreUYEreUYX1nzgDgV:W7ZrpApJ68nNIreUvreUunzgDgV

Score
9/10

Malware Config

Signatures

  • Renames multiple (3744) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a26ccea8300f4a6078a589fc60bde5e366d6aa1b05a5652fa475be0c282ebb1.exe
    "C:\Users\Admin\AppData\Local\Temp\6a26ccea8300f4a6078a589fc60bde5e366d6aa1b05a5652fa475be0c282ebb1.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

    Filesize

    57KB

    MD5

    dc6c7ac23906cb74a8532a47296fb3f3

    SHA1

    c0cf6fc441f6deb54a6225eb4618227e7436ce6c

    SHA256

    23db5642aad3738ea230f3e68dbe0c174a864cbcb7b484cce1e3c2bc6400de77

    SHA512

    5bc7efa1e067347452cd1f930a16e42e39d0d1508e2060771f952d81ace88febc43e52a0c85af658392596248f228744475f67426a851b5b85b98861ecdd5540

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    66KB

    MD5

    176632ea5ebfa81a78a6b0d1929bee7e

    SHA1

    cd1e84f076658dd757d364e45651b556edae2196

    SHA256

    e7556c142109b44269713bf95fca314508acd982eb2cb47a6ace9f05469cf6a5

    SHA512

    b928572fcc2b3d0b8318337411c7140894e043b322055f63cd9655ca282fdb430f08b993d27a2f7e82f3849e3016432c1aacc986b2204d49dc2743f3a7bf2ff9