Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    09/08/2024, 03:07

General

  • Target

    dc414a960c5788e1153a00864d206b06bd0632ec185d56c98d9077acb2ef6a45.exe

  • Size

    42KB

  • MD5

    837a350253c88655334c9ea97e5874e6

  • SHA1

    85e3a317be64fdadd9b605a6f586685d589c1f9f

  • SHA256

    dc414a960c5788e1153a00864d206b06bd0632ec185d56c98d9077acb2ef6a45

  • SHA512

    4f096943287f8440d5b930d9be7d126dee7aad7fbabaa9df1c3e7b4fa63a45ef2e005d7b0eacbf951435d624e989bf36d45ec9d0e46337514d646dd42f51ad9b

  • SSDEEP

    768:/7BlpQpARFbhefnj0Tjfnj0TPuQogKO4iJfogKO4iJbZe:/7ZQpApouADDZe

Score
9/10

Malware Config

Signatures

  • Renames multiple (4120) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\dc414a960c5788e1153a00864d206b06bd0632ec185d56c98d9077acb2ef6a45.exe
    "C:\Users\Admin\AppData\Local\Temp\dc414a960c5788e1153a00864d206b06bd0632ec185d56c98d9077acb2ef6a45.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini.tmp

    Filesize

    42KB

    MD5

    fc0d563b74f6f6b6c58602538876ae3b

    SHA1

    4fb2e11493dbab6662b418d2f492d16f6a3672fa

    SHA256

    246fcde84027093de42abd1fd187b04cac0c6c25777cb0276b9b17b8da1b46fb

    SHA512

    735987cd9da3561fded243bd84570ca136c625c05b7f430398d1c7ed404a8f9541abdaf510be5ce0b870b09f44498eb212af3d7a27811602a869f38aef5c7a89

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    51KB

    MD5

    f11383ac174bbee09ee74ef6e69fcfae

    SHA1

    3878fbc1b09b418d1c875672e29411cd546f3635

    SHA256

    7ec07f994382e3e0c3e8db16a68aac4ec62c688f8709706f94416a05309557dd

    SHA512

    7a591ab1050dd9c9d4dcab9b11e1289366ed7bac3bbb9628ac410bdec1a3d97c1ceaccc4789d2a79a6a5b9c08ecbb038b244d171c2ba7489789187fc7ce9801b

  • memory/2624-3-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB