Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    05/08/2024, 20:25

General

  • Target

    3687178a9848ea3721f8689ecc229201d9a821d18e795c9f53f3dd3a84adb5ac.exe

  • Size

    473KB

  • MD5

    a5f1a88de7c475e0b11e1deef7588666

  • SHA1

    63c4417ed9b0c2f66aa8f820a25c4a8f0d977a47

  • SHA256

    3687178a9848ea3721f8689ecc229201d9a821d18e795c9f53f3dd3a84adb5ac

  • SHA512

    d8271f4067f33f3c6d8c119a882722307895b767c62c74d9febc3bb84f04163b2e0564e71b668b192e76c880aec826706e17b63c356b218132ccd3209e05d3e5

  • SSDEEP

    6144:RqKPlJT2WFzu5Db7k6FLrLk/B+xhY3ClhiEiQhT+JgUEkBEk8ox3kEFytR:vrT2Wxudk6FLHk/B+xKClhiEn

Score
9/10

Malware Config

Signatures

  • Renames multiple (2108) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3687178a9848ea3721f8689ecc229201d9a821d18e795c9f53f3dd3a84adb5ac.exe
    "C:\Users\Admin\AppData\Local\Temp\3687178a9848ea3721f8689ecc229201d9a821d18e795c9f53f3dd3a84adb5ac.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3004

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2172136094-3310281978-782691160-1000\desktop.ini.tmp

          Filesize

          473KB

          MD5

          134ce475a144e8f51ccaaec72950608e

          SHA1

          2438686b8130028ba5a7830ea5641c48b5c2a8ee

          SHA256

          73a71c47ba2a359c3ceeec636fbf973865f15682ae3c826b1547639d8fc3e230

          SHA512

          92a5e78f2c8e2aec7025a1ed68aa7ab28f97bd8628d1316e64c2e4ea09c8ecef6337f7d13fd1854ca4e2c9f4c51a44d5cab0fc8fa97aba49793e5b993e16aa22

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          482KB

          MD5

          7572e0c3862121fea8432725a6d57536

          SHA1

          7777745a214fff790620cbece9042f2993b3746b

          SHA256

          c838a8d207c139956ffb144673b0bdc27c190651cbc4eb730d980bc6230b5a69

          SHA512

          076f31bab16becb88218cb918a8681afea97c0ebd068914ec7f7d443ba4eb01b98f1afe4fc22bed007a9c9b0c09b08e57e63ce3eba49a8a09a4b18eb5b12ef4a