Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    07-08-2024 01:15

General

  • Target

    a152ad97132939f460c6fd350059b332561bbf84048d67a742209bb851ef36a0.exe

  • Size

    43KB

  • MD5

    e9805346de43607859804cc1b6ace7f8

  • SHA1

    e7edb55de04475691f9e5365f2ec9835ec423f58

  • SHA256

    a152ad97132939f460c6fd350059b332561bbf84048d67a742209bb851ef36a0

  • SHA512

    dec228d2ae39a6889274a289e6e0f99730fe43a6c3dcf23fd38e9ff8fcad89297639b10aba85a821b6929827c9bb3dce6c02350d83863db8b48e8f6118e650b4

  • SSDEEP

    384:yBs7Br5xjL8AgA71FbhvPvD4Qfxd4QfxIAqAJOCAqAJO5EY:/7BlpQpARFbh3vzfxRfx7qAJUqAJ0EY

Score
9/10

Malware Config

Signatures

  • Renames multiple (3701) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a152ad97132939f460c6fd350059b332561bbf84048d67a742209bb851ef36a0.exe
    "C:\Users\Admin\AppData\Local\Temp\a152ad97132939f460c6fd350059b332561bbf84048d67a742209bb851ef36a0.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2188

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    44KB

    MD5

    0313d44a2327ff6410c6ede8983cc2d4

    SHA1

    8b202958f1d201640a61d642a07e210c583f3da8

    SHA256

    84ca9b8b5d1a02f261a3518b92b4a95de306309e3abd1a844b30ed483b102ad4

    SHA512

    02da2313bc636ac3a086d7fb795eeae4722079e9e8324ddaaa37f8c5df99b42cb14b5eba0bbf558b17edb43a841f96e50be51c2fb649512640106b85f458d7dd

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    53KB

    MD5

    a46edb7972adc3eade8db4f8574ffd3b

    SHA1

    82d634f4ad30e75a76f22d1c83e6de9c1eb1c212

    SHA256

    51e8b83e2d9cb9f300b4df482ffcf8175e02e1574802a2aad9d8e6a331cf6cf6

    SHA512

    df6cc64f2a13940dd962a73619ad003f4980a3cbbb73ee53944a4690248ff773043a6bf527c35ad605312bf7e64cbf8a54dcab1423f2eb614552e4fb4b7a3d49

  • memory/2188-3-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB