Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    05/08/2024, 18:19

General

  • Target

    050af7422d7428e0e745bacd28e4fe945fa2a1fca27dd08231326a8f7364da8c.exe

  • Size

    76KB

  • MD5

    d27049c40cab366c49628d2fc190c1ac

  • SHA1

    f074d2814ee6c64ad7970e81d83b6dd36bf0772e

  • SHA256

    050af7422d7428e0e745bacd28e4fe945fa2a1fca27dd08231326a8f7364da8c

  • SHA512

    c5cfb72dcf0d12e0003c516fc3db41e5bca0e6717689ddf284d6fc01f4e5d403006a70981d96b56786cbdd7de84ccf6f7883418d557b3488e0216f97e7b17ece

  • SSDEEP

    1536:W7Z+pApfGQ3y3RWvfmRfm9sKsSd5GT6SmbIbm:6+WpDfmRfmh2TO

Score
9/10

Malware Config

Signatures

  • Renames multiple (3676) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\050af7422d7428e0e745bacd28e4fe945fa2a1fca27dd08231326a8f7364da8c.exe
    "C:\Users\Admin\AppData\Local\Temp\050af7422d7428e0e745bacd28e4fe945fa2a1fca27dd08231326a8f7364da8c.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    76KB

    MD5

    b12d2ec598ebd60d17e1e3ba6b205216

    SHA1

    3c2452e6e98adef3e5a08c941b8dc70e42402eac

    SHA256

    61826610fec4c71f0e9a590295d55cfe88447fb53756345c133f486daa880faa

    SHA512

    bd03b0c12b89352019147a98c03ba46716c84b3d7f9464be49278b9235ed7397d2768e2a84942366dc65f22e5da9dc9967523f69f7811f254404027e543f8490

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    85KB

    MD5

    fd2b49af63adda70881cd80bf92d2c30

    SHA1

    2e6fca421d19d857c147abe96b296ba3c2065917

    SHA256

    dc25efa9461fedd441b6ea6937a7b43e3b2de87fc7032589e3e56b4ee0c4b1ab

    SHA512

    0b4232af78e37c13fe0fbf1b7f626a3d0fd75930631b3a36beaeee81602806da1dba8a4ab12ef1fc2b05ffb031407a328d14acdf99d9aca69cc44e5576535f93