Analysis

  • max time kernel
    150s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    06/08/2024, 19:37

General

  • Target

    21ff679da035cad23bea0f6a208ada6e11f30aea81f492455b215f3ed7d73adb.exe

  • Size

    40KB

  • MD5

    4935cea28a21bbf3587f038dd1e6f467

  • SHA1

    b12b3be2f3957f26309be13b34cab9c71c407b05

  • SHA256

    21ff679da035cad23bea0f6a208ada6e11f30aea81f492455b215f3ed7d73adb

  • SHA512

    bb4ce27ddcd62f8022d6e80534ce231fd0cdb4f3f82bbebf333414ae028684562e542b8ec52a5bac44de33c130594b90faca1a24ac878d92d8061f2e6d903f6a

  • SSDEEP

    384:GBt7Br5xjL9AgA71Fbhv7bhvo42L5FgAytBpR42L5FgAytBpW/7KmK8:W7BlpppARFbhjbhg42LcfpR42LcfpW/f

Score
9/10

Malware Config

Signatures

  • Renames multiple (4109) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\21ff679da035cad23bea0f6a208ada6e11f30aea81f492455b215f3ed7d73adb.exe
    "C:\Users\Admin\AppData\Local\Temp\21ff679da035cad23bea0f6a208ada6e11f30aea81f492455b215f3ed7d73adb.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2388

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini.tmp

    Filesize

    41KB

    MD5

    fb6ddba08bb401806f86fd4ad0f15abc

    SHA1

    c39a47099d52a049a589c1790ccbed03480521fb

    SHA256

    04340229ae44b57bdf6e6e8ac73dd0f4645547f03b04c78ad0a0e5d5eab7211c

    SHA512

    d7b95a9a44db1f60137f954bbd33484b7c126ea0c0974962d756f42de9ed745be5890bcb65cec209ae6070634b450daed93f09b4ab4e000e9d4d514ef84912d0

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    50KB

    MD5

    01dae69841448809fafe4ff24fb955a6

    SHA1

    0fa3c2125d37961b175b22b982e0707ab669539a

    SHA256

    49d5150f34ea71fd11515e12539feee16d27c2ab70a81694fd2f017f6fb31cd6

    SHA512

    d5d4189f15c67fb4b981fd2de8872f451de72e0c29ce9103438c497f8b3b05139cd3a8378dce23d6702082801d5f0c8b6fa2cc0f47de745f2c2ef6b6399ae219