Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    06-08-2024 00:52

General

  • Target

    a43f2fcf8292f05a8f447b549cc8b83400ac84fc5622a5060e7d8eb2f473c4e0.exe

  • Size

    76KB

  • MD5

    dd69ee185332320d85ee87df1031cf56

  • SHA1

    9a3731fa719139605691459347a66076c5dbbdda

  • SHA256

    a43f2fcf8292f05a8f447b549cc8b83400ac84fc5622a5060e7d8eb2f473c4e0

  • SHA512

    9eba37bbd7a19777f490a36bc8c5449616d5508bed501dd10971b20e373c2b5fd2105b045d3a5c8737169b60f7553fde8b6b45bc6f7ce76fb009e90c06c202bd

  • SSDEEP

    768:W7Blp9pARFbhQSox/6Sox/ME4JAIAepE4JAIAeuDlmlQPc3f6Pc3f5TGotuMOiJX:W7Z9pApQESOHepOHe8G+6E65TGA2Dbx0

Score
9/10

Malware Config

Signatures

  • Renames multiple (3519) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a43f2fcf8292f05a8f447b549cc8b83400ac84fc5622a5060e7d8eb2f473c4e0.exe
    "C:\Users\Admin\AppData\Local\Temp\a43f2fcf8292f05a8f447b549cc8b83400ac84fc5622a5060e7d8eb2f473c4e0.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

    Filesize

    77KB

    MD5

    a1765c4be1fdd318238c2b9ded758e06

    SHA1

    b972e9dc578c001a45e45bae9904455e46f6c9ac

    SHA256

    4beca27eb5eba4448c302c243ac32d0eab109875a90ff8a40c5314df1e5f8b96

    SHA512

    ea3ec2b60874ebb870f34e9a769b8a71231c86f2c1da94a3511d514adaa8c73617e48a7754a580cece9eaca50b8ad2f14ccbe16ce79200e605d8280e47eb7973

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    85KB

    MD5

    8373e6dadfed35386cfb7611f8326b83

    SHA1

    67e1dd1c799de677b8daa77dd911246d4afa3812

    SHA256

    9eb72b5c8892ee3ab3c3281846b121c7c830e986b7fcbab1bb60ff1f15e3cb0c

    SHA512

    bec90c696932c357e2130094cf36021dcb20b1f2fb749a5cbe09ca91a74f25a7e1df8c93ac9ca2ee2e2ce3255f1f8494bc92296955af38de3538b87e7ba9b1d5