Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    05/08/2024, 18:23

General

  • Target

    06c1a43fbcaf4a74ee1410ba0aed302c9026545b0e9ee197b99440ea8d134e52.exe

  • Size

    37KB

  • MD5

    7ede1cf1a0e13c0ded26499c16d37ca9

  • SHA1

    39b439f68572e6dfc5aec7df61e56cb254a0c76f

  • SHA256

    06c1a43fbcaf4a74ee1410ba0aed302c9026545b0e9ee197b99440ea8d134e52

  • SHA512

    4534d36b676506b4c36f17e924d1b76b62f85a12376d0e32d220417c5196d6d3622ab50ea0ebfe4d64e1680862dc370256ef4eded39038dbfdcc2a6344c5f51c

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LObC8p8A6:W7ZhA7pApM21LOA1LON6

Score
9/10

Malware Config

Signatures

  • Renames multiple (3798) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\06c1a43fbcaf4a74ee1410ba0aed302c9026545b0e9ee197b99440ea8d134e52.exe
    "C:\Users\Admin\AppData\Local\Temp\06c1a43fbcaf4a74ee1410ba0aed302c9026545b0e9ee197b99440ea8d134e52.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2568

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

          Filesize

          37KB

          MD5

          b8cb2f2f9191d0f25433d905c262a591

          SHA1

          d28fd4a3ff854aa7646d0b1cfc5a394302919bbe

          SHA256

          4e194f18b3cf80fc7055d887209625313cdd40c2e2638fa03715d29c5eed527c

          SHA512

          4a160847a29c0e13768cde989554f78bc72486a37c7ab8bfff9a429c3103c5a51db990f82e4292a962e454118f073da18c2f1b0437f6514305e023588144f858

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          46KB

          MD5

          14e5a22adacadfc0485d4544ac9462d1

          SHA1

          931617733b42d4cd4731610591e033ee53b76aaa

          SHA256

          210bb2e3adaf4d4ea795ab22bccb6027772ddb1162b8c255b75dacafe1fcbfe7

          SHA512

          ed0f0ed9eda04f9415570111f091890530461ca533d627ffff1677fa743f5b24a734aaa636d80c89f5c49de32a848238210b22a36458401d32190f2357a707bf