Analysis

  • max time kernel
    150s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    09-08-2024 18:31

General

  • Target

    0a3c950fe8f77b68b8b7fac97b51df538c18c2930d17908fccaf5a31869794b4.exe

  • Size

    53KB

  • MD5

    5009ebe1b4fd483a81e18cba552c3996

  • SHA1

    a2a5adad76f56871d0bdd8e3740e34e0f8fabd81

  • SHA256

    0a3c950fe8f77b68b8b7fac97b51df538c18c2930d17908fccaf5a31869794b4

  • SHA512

    0956dd15da983c2872c4489e1f7c92f2c25008e5a8b2f79824765d556aae02bcf781d06d056901e4697e7ea92ed6293e8b06bbd8a8f5a4b60fc4311123a87247

  • SSDEEP

    768:W7BlpppARFbhHFoqAJwBqAJw1VyjVyfxAkJhxAkJ5uv4Luv4Ve2/Qdme2/QdAe2F:W7ZppApyVyjVy7bJ

Score
9/10

Malware Config

Signatures

  • Renames multiple (926) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a3c950fe8f77b68b8b7fac97b51df538c18c2930d17908fccaf5a31869794b4.exe
    "C:\Users\Admin\AppData\Local\Temp\0a3c950fe8f77b68b8b7fac97b51df538c18c2930d17908fccaf5a31869794b4.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1292

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

    Filesize

    54KB

    MD5

    4ade3ec024cc71a499fb5247ab6de059

    SHA1

    b459037986c962565a79097953aec3393a22dd8a

    SHA256

    24d75ff70407ae3cd354ac2ebc8341c3f99dfaeb3093497acad5e8e9bd58606b

    SHA512

    8bc3fde0d1842ea378718b647d1d3a8ccea4893ab62ffaa83cf2306e2f66bc43ea438ce13aa5d51239cde03763d1e358797147cc84d223e0a86503753162d0e8

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    63KB

    MD5

    3098fda44800ed3d34dac42998f1fe05

    SHA1

    228840ab38ceba0492e1bf0e68154ff1b4ba768d

    SHA256

    04d8a586c32eefd37d1f66f2b8915f01de7795fc64491952838c16d1b41d7ba4

    SHA512

    fec4a3d84082efbc234d195723b9020bdbd9aa97664c28289c339bca7c36c0e7361acb903e27058e68f743073893884df0cc66a0b0a8aeabd71e114e1408759d