Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    09/08/2024, 23:25

General

  • Target

    8064a258b9bd258a8f32842108f4db9b74300aa1fa3685dc76ba8bbe11de0332.exe

  • Size

    32KB

  • MD5

    a6685246b9b71ee3c1c36335fbdce17a

  • SHA1

    b21a21969dda2f69538ed8c6eb14284f0de29cf3

  • SHA256

    8064a258b9bd258a8f32842108f4db9b74300aa1fa3685dc76ba8bbe11de0332

  • SHA512

    354e3e07f865fbc0fbc6dbf36cf6afb6f8ef1ac63d369a12d76e3a4416fd3b882a52cc4a7d9472eac06f60131a2e0859c2f9580b77fbec1d66bde478e645c31c

  • SSDEEP

    384:GBt7Br5xjLvassAgA71FbhvYD/DCgAgT9L:W7Blp2sspARFbhO9L

Score
9/10

Malware Config

Signatures

  • Renames multiple (3946) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8064a258b9bd258a8f32842108f4db9b74300aa1fa3685dc76ba8bbe11de0332.exe
    "C:\Users\Admin\AppData\Local\Temp\8064a258b9bd258a8f32842108f4db9b74300aa1fa3685dc76ba8bbe11de0332.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    33KB

    MD5

    d99fe1a54960ab5cb499c6a99f81529d

    SHA1

    7f3988dc7bf9c26f4843b5484e2ac95d1a863293

    SHA256

    b66d04e6c8d43ee0ca34dc303886d235aeeeb90f61e39d91ffea8d3f2ccda3c5

    SHA512

    dc08f9fbc387959c940ee63edd28de2580d8da93fcadf24e5611b9d168b0ac960e4509b57696b12237c7125eefd3f81eac277714f010ffc6a3c8d59849d2d864

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    41KB

    MD5

    74c815912d5fd62a1c3b14c1b3b212dd

    SHA1

    9692f1320d6b702722726df2aad185e3023fde43

    SHA256

    c31d4e02cf32d608e34e4f20f3ee1001404d183439bf6865f2e67fb0b534c307

    SHA512

    6cff45efdbd523d42653caaae032ba999af7600fda44bf681bc4f0c10261b8ba84803160b22f45093696800b34d5f416f5f3411627c402c88d365fddcbd68a67