Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    06/08/2024, 08:52

General

  • Target

    864780c3bfb3f858695959432ca92690N.exe

  • Size

    64KB

  • MD5

    864780c3bfb3f858695959432ca92690

  • SHA1

    fd7d5b16c4b1b2ab9974a0f3bc72fbfc7394227e

  • SHA256

    e67efa169a1d2e25141a4b83616474c90cb9e215609d2052fa66d467a6244fe7

  • SHA512

    8d34ca285a52df6a072b8fa496b8e0bceb02e0367597135fc54d83bc6468ba93a7001763bcf5917e1958076064e6f005d62d22bab363ceb49a504e76d3a8e86a

  • SSDEEP

    1536:W7ZppApwEwnmJARJAaXxXNJdkCKPuJdkCKPm:6pWpUnDXxX5

Score
9/10

Malware Config

Signatures

  • Renames multiple (3168) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\864780c3bfb3f858695959432ca92690N.exe
    "C:\Users\Admin\AppData\Local\Temp\864780c3bfb3f858695959432ca92690N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2344

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2172136094-3310281978-782691160-1000\desktop.ini.tmp

    Filesize

    64KB

    MD5

    1391d6dc6b5f530136d193fa440cff33

    SHA1

    e62b8ac41202dfc3ee6d619b6797f480a23db372

    SHA256

    a869a5da681132330234c5cab015aa626153777d4304097588404741dbb7e675

    SHA512

    d0b7438c06e6b600e254d5fe415757a978c88043e19ae751c8a54d202a8b1ddaa10c680e1b739a4746c0c16e5a26787be462a5673a099d7f7b66344d598e0ef7

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    73KB

    MD5

    9c0fdef282b5016ac0cd1b725a0cfc35

    SHA1

    75da96dedf9b3def0a542029bccc4e128ba5197c

    SHA256

    755b0f5242e398e6f2843c18fc0250fa03f445d43d2f6569583ffaa08f9b97b7

    SHA512

    6aac4a9915345b30223161d726a3ee4fbeab5a8c9b760535f77fdf8980120fc09523d5d5bea0866c849d1646f6bba31bbfce946862a53c31d353de33a118abe0