Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    07-08-2024 23:45

General

  • Target

    7adc344942d7215b5a417b4a9e881d474cf7eacdf8690fa4df38234259dca0bc.exe

  • Size

    57KB

  • MD5

    6ff43b1450df9227e1bd3469b9430312

  • SHA1

    024a4ce1b35cecd81eddf57a22db084a2d6d2b54

  • SHA256

    7adc344942d7215b5a417b4a9e881d474cf7eacdf8690fa4df38234259dca0bc

  • SHA512

    f4a196cc6d87301c911d2c9ebddbee7560d7f57778d3f607e6bae4fcfcdac783d3ceb8eb3f9b74649e86d110e9f1ae02b53a497891d7aae3fd2175909c3b491a

  • SSDEEP

    768:W7BlphA7pARFbhL801VvM801Vvv7lSKSW7afHFCSW7afHFIkm:W7ZhA7pApw03vR03vxSKSWu0SWu2km

Score
9/10

Malware Config

Signatures

  • Renames multiple (3796) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7adc344942d7215b5a417b4a9e881d474cf7eacdf8690fa4df38234259dca0bc.exe
    "C:\Users\Admin\AppData\Local\Temp\7adc344942d7215b5a417b4a9e881d474cf7eacdf8690fa4df38234259dca0bc.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2104

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini.tmp

    Filesize

    57KB

    MD5

    5476ee203a3c252a9658d85fbb251475

    SHA1

    6a9aa45402acb372040820ff727b404bbab4e463

    SHA256

    d3340a8dec2fbca280ecfb7bbbb17292fe02d03824f7cfbec7ccb0d7b435c962

    SHA512

    a5c53ca746b74e8657d49f324397a86ecf97a34df009157ee9bb1cd4fc5be267b73a0befe25591281afad1bfad942d59e691a1e362ac06124c433aa899c247aa

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    66KB

    MD5

    6ed8c5115bddae5fcf2104bdd33bf385

    SHA1

    09c407e765a47a5c9fd2e9e029773bb9da610ff0

    SHA256

    296ca844a1887ab875b71f577e5b4cf2bd2e09c01a200964810849ab596d4a4c

    SHA512

    554b97e30f5f94fdb8171eff6c47b8c08214bb06ab30914f5b85f5859104bb379f4f9ce94c9249ef7888cdb31c329b07385ea90a48e0f106452aea52d092148a