Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    08-08-2024 19:44

General

  • Target

    29f0d3e21b92fc7b13c7162b49c2752edd01730e33e09c1ceb1b1af6886abc57.exe

  • Size

    45KB

  • MD5

    7a6b591712bcdbcf4fb06dd31bc140aa

  • SHA1

    6688907051e105ec84f723cb257b7b152c6f55ed

  • SHA256

    29f0d3e21b92fc7b13c7162b49c2752edd01730e33e09c1ceb1b1af6886abc57

  • SHA512

    3dba4d8bbe679ecac7683b5dbaad4fde3ae7346d522e11c03370eee5aa7e1f4879156bad858ed9d7246e7e4a8e6fa5c91db3b3830b7e5db9aba9f593a24313e9

  • SSDEEP

    384:GBt7Br5xjL9AgA71FbhvuNBNQFrs0AqAJwO1AqAJwOfF2JouP2JouQw5A5b:W7BlpppARFbhHFoqAJwBqAJwRJofJoTL

Score
9/10

Malware Config

Signatures

  • Renames multiple (3770) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\29f0d3e21b92fc7b13c7162b49c2752edd01730e33e09c1ceb1b1af6886abc57.exe
    "C:\Users\Admin\AppData\Local\Temp\29f0d3e21b92fc7b13c7162b49c2752edd01730e33e09c1ceb1b1af6886abc57.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

    Filesize

    45KB

    MD5

    bf29f4534c7da61d34ab71743ddc86e4

    SHA1

    a78da6b7dc7d1e80860bbeeaffdd230d85732b42

    SHA256

    d49764042604e30bb03e2585c63bc17a5cc47972bce43d7c570bf6924b1284cd

    SHA512

    c4c891990258e6a5279b07d67f2017a353b9b8f84a2f299a0f71cc84cb2b767e0baa739d1b78eaef331bb315471e03c8b450cc2548d628568a43be595519e0da

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    54KB

    MD5

    27717341932ff38a97c1d0dcc976c8d9

    SHA1

    e8e581a9b07b0981f98981a7fc4037995e7acf7e

    SHA256

    12ad46bcc5f5a813bf0a1c80f9926863d882a641113d8d7d69161c35bc0ee029

    SHA512

    ce46278545353f9c0e917ccfdf4e383f346a57de3c7172cf90ba3f8237ed15a11d001828626dea61b8515872b0406ba56ac96705ad8aeb2a6a7be37d00b738e7