Analysis

  • max time kernel
    150s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    09/08/2024, 01:50

General

  • Target

    be55034582c7049433e4e4a21a03a3ceceba4f12908aa76660c3f463c597581b.exe

  • Size

    97KB

  • MD5

    86db88ec691bfa4e18e3ff93139b6c07

  • SHA1

    b584c5c7783c041e66095647b6090306b2c50422

  • SHA256

    be55034582c7049433e4e4a21a03a3ceceba4f12908aa76660c3f463c597581b

  • SHA512

    caefd1cf773bdc06ab86653e4956d631c51aa9940554780020b64458cd8c7ebe8f0def81f4c80a6ca7f30693e1abfe9193f52c7fc86daadf2e24f234d7f07d21

  • SSDEEP

    3072:6pWpUFpEhLfyBtPf50FWkFpPDze/qFsxEhLfyBtPf50FWkFpPDze/qFslEhLfyBB:PqFF2Ie+efsLV

Score
9/10

Malware Config

Signatures

  • Renames multiple (3627) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\be55034582c7049433e4e4a21a03a3ceceba4f12908aa76660c3f463c597581b.exe
    "C:\Users\Admin\AppData\Local\Temp\be55034582c7049433e4e4a21a03a3ceceba4f12908aa76660c3f463c597581b.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    97KB

    MD5

    a7d3f9661f4609fef2cab35f4c0bfaff

    SHA1

    33a70c09d9ea7aa4c5aae0a88634bfae3520c0e4

    SHA256

    2956171012f2329244850bbfec5b8d86356758a9460f132be904aa9d50dd5c70

    SHA512

    3eb29b48136653123ed8870eb95e0b76055c6ba3f25d82ad280e49c8e82fca01b17e4a3234dc18ca66a86dd42bdb168f6461e40f83a1b1aa15883ec68f5bd7bd

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    106KB

    MD5

    c2b4cea94a4a1991fe0b7de8f09dc437

    SHA1

    550dcbfdcc0f58dc32059b4297929db20e207196

    SHA256

    063e7333c2e7f47d9857fbf34695db0454d1f7266f0d2fd87541b676635448e7

    SHA512

    4e628583f88f7d882241c3d42626c943be49ff099ce58ede80f3a40a9b818034771adab5a099fb8b00c1b1f7c525335cb67d6b6d712c389ffb81d726e227b08e