Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    07-08-2024 00:23

General

  • Target

    8d89b38ce159a8a535944cb717dcd6819d3cea2ffd2f09211a0803e7f38bb6bb.exe

  • Size

    41KB

  • MD5

    06db94285e6d203748da857007cb9028

  • SHA1

    166bcffdc7ca30a9dad382729983ba9716660d70

  • SHA256

    8d89b38ce159a8a535944cb717dcd6819d3cea2ffd2f09211a0803e7f38bb6bb

  • SHA512

    97df3674d187e555a80466cf7995b2de2503fce55e50384f4ff32d2258291e0f5b504a782f8540756ddaeae1d30a5d347d30ebdadd63d8d211cf9746782dfb14

  • SSDEEP

    192:pACU3DIY0Br5xjL/EAgAQmP1oynLb22vB7m/FJHo7m/FJH6vBSSvBS4FmZgMOMM:yBs7Br5xjL8AgA71Fbhvx/5MgNZ

Score
9/10

Malware Config

Signatures

  • Renames multiple (3749) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d89b38ce159a8a535944cb717dcd6819d3cea2ffd2f09211a0803e7f38bb6bb.exe
    "C:\Users\Admin\AppData\Local\Temp\8d89b38ce159a8a535944cb717dcd6819d3cea2ffd2f09211a0803e7f38bb6bb.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:468

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

    Filesize

    41KB

    MD5

    1a493bbcff38dc4aae4840e25b8bacc1

    SHA1

    52cf9cb83c7402ef52a93b88a6a78255c9fa34ab

    SHA256

    3eee1898531140141d7dab53e94a30561cccf0450984001511e9ea5be046ced6

    SHA512

    9a4b693d209ea6426b2ddc75b3b90178223d1e0240451bcca48ffd7a638c3a4971efe02bac2b918d564d2875090818a6542b60fe7f5df1342a27db5a1e0d6815

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    50KB

    MD5

    5fca58f3d09e342628e7326dc5774c59

    SHA1

    04a6293ef9faf02926db91871b6decaf1088bc53

    SHA256

    c3662bb55a5731d90290bd284bcba95c3c7ebd40ebde5a19f111c674683ba72d

    SHA512

    5f035e1c6f645d1cfdaa7c843e6deef9c131a51b14ed44567f5126b7041f1a69e55e2d360ad9b23ea609e9e43ff7a38ebc05db80d21fbb8f8975f60c6b38dfe7

  • memory/468-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/468-654-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB