Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    07/08/2024, 18:57

General

  • Target

    0fcc5a34e09938e0f49792317babcfc8b530920a63705a96a5cde49c32eea44b.exe

  • Size

    53KB

  • MD5

    3d579f179870c86d52512c65cd5aa565

  • SHA1

    00c89de2c6c68196601215379596d27bb0f7a63c

  • SHA256

    0fcc5a34e09938e0f49792317babcfc8b530920a63705a96a5cde49c32eea44b

  • SHA512

    88562dc8c1481e2f99880ecc2f10f9cfe33bf2f7505e8e1e0a2367310f8deba66c540240478f15687cf00e1db3f6bb8a48bad84baea7ca81a5baf562afe72cae

  • SSDEEP

    768:W7BlphA7pARFbhvOsTKnKqtkYi+3lNrJrQ:W7ZhA7pApvOsOKCj1Q

Score
9/10

Malware Config

Signatures

  • Renames multiple (3767) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0fcc5a34e09938e0f49792317babcfc8b530920a63705a96a5cde49c32eea44b.exe
    "C:\Users\Admin\AppData\Local\Temp\0fcc5a34e09938e0f49792317babcfc8b530920a63705a96a5cde49c32eea44b.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2080

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

          Filesize

          53KB

          MD5

          7806df83686915afaf88c12437ffb082

          SHA1

          a2dc1a1b3a13bed389caf7f7d380e90e700bfe40

          SHA256

          70c85f53f6ddd2d46341ae2633d3c94fac2303da375293ed01b552691c03fe33

          SHA512

          3e9e3feb1135c6d3196bc9d5ccd68cdccb25afe3d4cdb1a89081890dd28615213969cfe5a2d2beb119e49c5c3c46479fba04df5289d62283736ce23f7ccbc3c6

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          62KB

          MD5

          303556064f6679511c292985d68019a1

          SHA1

          33ddd05b7eeb0f5453adf8f47d1278ca20d38404

          SHA256

          f925cc6bcdf3acf289b4eccb5477c48abbfd94f94f4ff7074126fff3c5089f57

          SHA512

          97f39e2031f34e5f646c69a90ca265a42766a8d09b24a95c22edf701c45c4ef31c4a117d1fc754ec3e03ee04ddea34eb03233c72f2a8e676880a83083bfba463