Analysis

  • max time kernel
    150s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    07-08-2024 22:18

General

  • Target

    5cffa659329d2ae888f8e2962b99c7493be0fd95a6aadcac9b57a261688a1f3c.exe

  • Size

    37KB

  • MD5

    599f7c2433b3484b0474e027ba084e7c

  • SHA1

    39a3a2e294e4241d21f72202196c9bfb67bc89f1

  • SHA256

    5cffa659329d2ae888f8e2962b99c7493be0fd95a6aadcac9b57a261688a1f3c

  • SHA512

    2a4c87c5db206450495a6ff01c7d83dcaee026f3b4c12a63ca6f00a4a56730958b1d78b24a7a40bdba1df6d5f17bfec31b187e28066d46c880be0a065bb9fe41

  • SSDEEP

    384:GBt7Br5xjL9AgA71Fbhv7bhv3KueKudLl++KIIwX4IwXy:W7BlpppARFbhjbhPKueKudLw1bWrWy

Score
9/10

Malware Config

Signatures

  • Renames multiple (1365) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5cffa659329d2ae888f8e2962b99c7493be0fd95a6aadcac9b57a261688a1f3c.exe
    "C:\Users\Admin\AppData\Local\Temp\5cffa659329d2ae888f8e2962b99c7493be0fd95a6aadcac9b57a261688a1f3c.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

    Filesize

    37KB

    MD5

    dbea21d0e0c0545f355b501450443bfd

    SHA1

    d3d6394bbce0bf804b6cb8b00e5531b88e6ce0e5

    SHA256

    c627bd98a47abf0d8cf15cdee0285f726043f2ab564764170dcbe9c2f3945cef

    SHA512

    d7e55423b9d5910c25bf31ec6a384baf5c878eb5db0760b5e0229c8f89f7e3941fb2bf63bc13148c8938968eed10e78ee343242a0d2e156095c14e0f981fd0aa

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    46KB

    MD5

    d79d147fa50dfe9baa3825cbdb2cdfda

    SHA1

    b3c37e57546f51ec56ddf88fe4c8daf14a68a1b1

    SHA256

    1816aeeb6399004a89f89032788c5d2a39b918d44deb1a7af0ae72b4d39819e2

    SHA512

    bc493160c9ebc13e847a5dc7cf10164185b75a11b24a0c73d74c45d3f4bce3beb6764885250b7dd0fe24627a6ad438d54b877aa741ca7e672638c0b7a5f07ca6