Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    09-08-2024 00:11

General

  • Target

    980d8eec608d186a95a9d6fabd3c0691745ca9ea02a63945e5522fdbdd42bf34.exe

  • Size

    62KB

  • MD5

    6fa4c2d6985d05352e492a8ee4fe36a7

  • SHA1

    4426515fe4456821ba499d660100509af35da83f

  • SHA256

    980d8eec608d186a95a9d6fabd3c0691745ca9ea02a63945e5522fdbdd42bf34

  • SHA512

    d349f8a13140d58f99542a1004b4fc4ec013dbb961870f0f2f49de58473f0236942c80f288f28f0ec85f0f6cdf30d6de607c651ae8e22eb0e7990a471c0094a8

  • SSDEEP

    768:W7BlpppARFbhHFoqAJwBqAJw70EXBwzEXBwcJdkCKPuJdkCKPiBcCBcu:W7ZppApAJdkCKPuJdkCKPG

Score
9/10

Malware Config

Signatures

  • Renames multiple (3891) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\980d8eec608d186a95a9d6fabd3c0691745ca9ea02a63945e5522fdbdd42bf34.exe
    "C:\Users\Admin\AppData\Local\Temp\980d8eec608d186a95a9d6fabd3c0691745ca9ea02a63945e5522fdbdd42bf34.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1500

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    63KB

    MD5

    47aad7113f4d93aa607092844b0682e6

    SHA1

    0d111e781abca779005da79502e7037a91799cbe

    SHA256

    b4e6ae271ec7863b1120d2283e5f257516ccee23e7827ebd2bf0185d0223dad5

    SHA512

    9e9fe698f136e4e7dde1dc54eff20ef8b70c6e1717c761a40de198c530e4912b4305d10bff61d6ca6e96cb5f6a856569cdf61aac085b5dd6bd5b770c8849f5d7

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    71KB

    MD5

    0d00927a5084366c9b9264c396175bd5

    SHA1

    ee3af2c902303bf8c0674367d8f573ac52d3f744

    SHA256

    9ec77eca5cb6da483413bcf35c3e07c3fb8a0d864023f3f6892b7f60ff616e59

    SHA512

    59c6c2f1ee49470f69e2d15ea555fa56c6cd7e5ab8bbbc687affd8e2aad4e7e0941bf09a0f98aaf83ce6865a0816c1b602d3e4c70c8a9cf72540e915216e9497