Analysis

  • max time kernel
    148s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    06-08-2024 01:11

General

  • Target

    a9f062071c536bd9e65544fa1e837e5b927bda750ee566457179da8ed344cd27.exe

  • Size

    89KB

  • MD5

    63a87a9ca3bc0369a76d7fa65b838450

  • SHA1

    583fbf679757c65fe02c719bfef3c64f5c3d8845

  • SHA256

    a9f062071c536bd9e65544fa1e837e5b927bda750ee566457179da8ed344cd27

  • SHA512

    a569bf9cedc120c54ca2d86dc871b077c574905e7c3ba51ad7e54b7b95e35a08f168883d211362568e7fd5985d19042d1c44b449f9c0eaae1a05b37a2e25ad2d

  • SSDEEP

    1536:W7ZhA7pApMaxB4b0CYJ97lEVqNR7Yge+eTdsdYSo5h:6e7WpMaxeb0CYJ97lEYNR73e+eBSo5h

Score
9/10

Malware Config

Signatures

  • Renames multiple (600) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9f062071c536bd9e65544fa1e837e5b927bda750ee566457179da8ed344cd27.exe
    "C:\Users\Admin\AppData\Local\Temp\a9f062071c536bd9e65544fa1e837e5b927bda750ee566457179da8ed344cd27.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

    Filesize

    90KB

    MD5

    97d6e126c7dbaee2674fe58fe2aab887

    SHA1

    d46f9cdee6d26e8003bbddff28d8d08616ee182c

    SHA256

    d627dd077c5f00a80f016306010dc5f69fbb36e03af9a46890aecc12056321b9

    SHA512

    8ae284e924f867b5d7cf254e3a4f414d601c80d3b27ebc13f6fb03fc13d27823bc6974767389b40d2ae0ebd710367d4a2fe004f5b9d7dc1537028ea72e49b648

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    98KB

    MD5

    4c15857ea51695cea660b629c2702ae6

    SHA1

    ace17ea20ac472cba15aebc9de9965b76e0b057d

    SHA256

    10a7fae465ae15c6365e55ba32ed265db91b69f474e45c0ab3dc3fd27b97e59f

    SHA512

    85de58dfd87c7006f18a4362f4fbf0146a536fcf350731ee060eae8c795b5574e6f60958bdfc699f5c9820594a93cd17b22322c0fe2235befd8548d02056764e