Analysis

  • max time kernel
    150s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    09-08-2024 22:54

General

  • Target

    74bc38e5698fb2b6b4d42ec57559779d6cb99b4f7fc10261fb68b759b7ab8547.exe

  • Size

    109KB

  • MD5

    48896acbc45b8d84d561e5f389f96ab5

  • SHA1

    50bfd94da51fc79e54b104d78d2ae6fa44a4ad7a

  • SHA256

    74bc38e5698fb2b6b4d42ec57559779d6cb99b4f7fc10261fb68b759b7ab8547

  • SHA512

    42afc4574cbe2812e477110e7a23c89b588a93e1486da3cc80d67e0e8ff10c969d8acf70902520f41a88c080b0bfdf04147b22132fdd89ce265b93505b1ed6c9

  • SSDEEP

    3072:6e7WpMaxeb0CYJ97lEYNR73e+eKZ0VXaSDxls:RqKvb0CYJ973e+eKZ0VI

Score
9/10

Malware Config

Signatures

  • Renames multiple (3437) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\74bc38e5698fb2b6b4d42ec57559779d6cb99b4f7fc10261fb68b759b7ab8547.exe
    "C:\Users\Admin\AppData\Local\Temp\74bc38e5698fb2b6b4d42ec57559779d6cb99b4f7fc10261fb68b759b7ab8547.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2172136094-3310281978-782691160-1000\desktop.ini.tmp

    Filesize

    109KB

    MD5

    c185be7fc58490a689c63d96d21a9a85

    SHA1

    f799d1adf33d665d4d614f63efe1bcbb1e93f7c7

    SHA256

    209365e59021123ea1e9658d00402c7a261bff0f2327048089ebee37af487176

    SHA512

    8dd52c1df3ddba46f47c29c4dddeffdcfd915aaa83d11956e8a4138918a0f52a11799b6ae0537e4f291fafbf2e5ebf0f56b687941cb581099c80573b3b7b23ed

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    118KB

    MD5

    c6c9c95543390556f0038d3e65949986

    SHA1

    790d2b78e3a4af3aff3c443ee94542d8e15dc9a5

    SHA256

    4edae57c89ee62b696852f537c47620e15c080a03bf1f60b82013517bc276fa7

    SHA512

    84f9b93885222b7966c4075b661327ad56d913cf61db0e6d65d5902125101cf1d5e16efdfda828ae2e09f8fda32abb067d3f9b2ca78578e7f9d50d0a1b6fc758