Analysis

  • max time kernel
    150s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    08/08/2024, 23:15

General

  • Target

    80b3ea347187d5f758e36d33dbd441a7cf25ba36ca51f614f8c1b50e810ee41f.exe

  • Size

    69KB

  • MD5

    23f086d1cd5ae7b35a074bfb64ba17a3

  • SHA1

    a1b0da629997b9d0490ee4e2e2f0c98035aeff64

  • SHA256

    80b3ea347187d5f758e36d33dbd441a7cf25ba36ca51f614f8c1b50e810ee41f

  • SHA512

    b1066db9781ac0f7254ab3046c9a844f39502694adffbb9310fcc558f5ab1bf9170be8f9ab785d5002a4ffdddccd8df22d1da12a3116cf6fc83ac47960fff766

  • SSDEEP

    768:W7BlpppARFbhHFoqAJwBqAJw70EXBwzEXBwcJdkCKPuJdkCKPv:W7ZppApAJdkCKPuJdkCKPv

Score
9/10

Malware Config

Signatures

  • Renames multiple (3735) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\80b3ea347187d5f758e36d33dbd441a7cf25ba36ca51f614f8c1b50e810ee41f.exe
    "C:\Users\Admin\AppData\Local\Temp\80b3ea347187d5f758e36d33dbd441a7cf25ba36ca51f614f8c1b50e810ee41f.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    69KB

    MD5

    945d6c4132ba3a0c77011743cdf126e5

    SHA1

    e592f2ead61306f9e283ffea87488b8e639e4656

    SHA256

    63ac43033addf333a68a116161432ba8c5e0335ec5df2a20dd1dda42218fc13d

    SHA512

    394468e7ef843b3aac0250cf310b257932e40e6ed9406cc51eebe560a33e309ebdc92662e0ad7a4bf31e3275ea24629546a65239febed4994b287a7e08ba3553

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    78KB

    MD5

    1f15e4e228e4e4a67c68208fe9ea5e59

    SHA1

    53f871fcf3769370e814e21e8e94166d7ade4d49

    SHA256

    3231772d2d9ec7a4ec728a0f34205fba8f5cb33729f0dfa9598f639b428e2a20

    SHA512

    743c6b6553ce339fcfc53b246fa3c55851c5f98e1e3d70637c13b104327ac2e0da21736a4bdc0da9b19f9f9e4a13bb074623e6333cc1d9b02c047d282911f2c6