Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    07/08/2024, 23:09

General

  • Target

    6d79c7b077c21e4786f0da8be2b2a141c7a062321161064fbbaaf12e9d7befd0.exe

  • Size

    49KB

  • MD5

    29f1307d43ae0d00c3676f9b64175921

  • SHA1

    67e63e8f88918d870d48cd8691f4efa470335796

  • SHA256

    6d79c7b077c21e4786f0da8be2b2a141c7a062321161064fbbaaf12e9d7befd0

  • SHA512

    990ae9d78f299594f307437cffa3565dcaebcf9f169b594de7fab99a80aa2e0ec76101c01c587512ea61bfa4737e4b5967d79c69af1c87283cce49a040d504ca

  • SSDEEP

    384:yBs7Br5xjL8AgA71FbhvBfepj3cfepj3KtLJr4S04SCzwzwl/Nl/Y:/7BlpQpARFbhq1KX101GIGjY

Score
9/10

Malware Config

Signatures

  • Renames multiple (3733) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d79c7b077c21e4786f0da8be2b2a141c7a062321161064fbbaaf12e9d7befd0.exe
    "C:\Users\Admin\AppData\Local\Temp\6d79c7b077c21e4786f0da8be2b2a141c7a062321161064fbbaaf12e9d7befd0.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    49KB

    MD5

    859e976b1b82bb4c515df8cd60d4dd7b

    SHA1

    d6707f3cc6b296da98518ef55a40e556cff200e5

    SHA256

    17b8f3d475b537e6ab42492c35b7d251460b3d004cb77e96983769aa615c9e6b

    SHA512

    c14a8dc560bbd220e9d9e2df3349c7d78bad6900497598df2585b22203376f0b9f584f27f8e6ef081b5b951f184001d4cbe9aa5efbc38aca8f33ad43ea6d028a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    58KB

    MD5

    a41dacd97fbc8d48d9fc2308e196d2c8

    SHA1

    cd7c4ac17c0734dba6e9135f3c88a4049fe12790

    SHA256

    2c8a83192dd363ba5589607157101bc985465d725c6c871fdf10f1b65e307094

    SHA512

    705c0f94cc945a6163bfc58ac8893c4dad9ff1aca0acb835066dd410e5482e69e3f08d74bd37ff09fae63f91e6244a38cc89228e103d0bd1af119f900c19c52f

  • memory/2824-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB