Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    09-08-2024 23:27

General

  • Target

    80f1882fbf7d930a5a069010a5adc26c568b5db9e8d9a7368bf10139464b5bb2.exe

  • Size

    77KB

  • MD5

    c294311e04c7aa4be1a0ae4540ac2a0e

  • SHA1

    606bdc962865ca273d6257e6f2b21c132e8b4839

  • SHA256

    80f1882fbf7d930a5a069010a5adc26c568b5db9e8d9a7368bf10139464b5bb2

  • SHA512

    0cb3ba216af3f63e3a2e9d6dc32566829952ca3d06558f67c9e37905383a6bd4227b310dd1f1eed22ee923dea51c6b8aafad3690a9498f014610c8e978667b1c

  • SSDEEP

    384:yBs7Br5xjL8AgA71FbhvJUfWGUfHjtmjtd5NaMR5NaBQNNXiB:/7BlpQpARFbhiWb8naOnaBGNXiB

Score
9/10

Malware Config

Signatures

  • Renames multiple (3684) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\80f1882fbf7d930a5a069010a5adc26c568b5db9e8d9a7368bf10139464b5bb2.exe
    "C:\Users\Admin\AppData\Local\Temp\80f1882fbf7d930a5a069010a5adc26c568b5db9e8d9a7368bf10139464b5bb2.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    78KB

    MD5

    083a002a614a40524068807c66e09dde

    SHA1

    e83fcfed0a32c04dbcfc1e9cde8f654f1f6bc27d

    SHA256

    24248963818cacb1af2526f755b67359f0f38398dc144601c8280f0890c54203

    SHA512

    3709a562e45470b5aa3cce56cf5e7be8c579138f6f34c8bf47dc9f3dcba68dc081d98b949bc5cfe5e29feaafd3c4e7fde6e2c92077d170173b4a034d1e2c5f63

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    87KB

    MD5

    cfee996025da21dfcb4b118edf99cdc0

    SHA1

    5b564921e4f6ae92e1ea29b89dafecdd880c1558

    SHA256

    33a2ffc49950b5e09012ef7c7ef4f74e7e5b76d938084e58bd8ac18dfe984ca3

    SHA512

    2ed09ef40b09d7fda4c23da0623b81f73ae3ab3a11503fc4ea99fed3fafe37d549c3022724475379d5c829db2547758146d310757ec10c52cd876be572a99f3d

  • memory/2584-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2584-652-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB