Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    09/08/2024, 20:01

General

  • Target

    2f8956cfa071807c3d718cd3c47aa688af600543995446b59c1b77b31a0e4270.exe

  • Size

    45KB

  • MD5

    93958f6371dec5583dd2b15feb9b3a45

  • SHA1

    18c47bae7bd2349e857eeb84e30c14f7bf0c9447

  • SHA256

    2f8956cfa071807c3d718cd3c47aa688af600543995446b59c1b77b31a0e4270

  • SHA512

    d2b0b494b417512c453882ea421e4be6ea7b049b7f8fb513f170ebb6620512a8d1778941b6d40c17e7a0a18a6b0b9524c9c2a0e9d6d65c8234ef9eb5663942b5

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfproFNFjqAJLOqAJLLeUe9:W7ZppApBULcfpHLcfpyDyeUe9

Score
9/10

Malware Config

Signatures

  • Renames multiple (1025) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f8956cfa071807c3d718cd3c47aa688af600543995446b59c1b77b31a0e4270.exe
    "C:\Users\Admin\AppData\Local\Temp\2f8956cfa071807c3d718cd3c47aa688af600543995446b59c1b77b31a0e4270.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2376

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

    Filesize

    45KB

    MD5

    39c5e565c28e35216c85bea81ee0b916

    SHA1

    6bf5f5d14995f7ee0be488c18d2560d5b9448b3c

    SHA256

    49df97a6f7b07026f1fdba3472dc0dc9034c939c5414e897dfab8cf2bfc58549

    SHA512

    b8f26a9a262fc39d4c2c7ec1f33a76fed96aa9368c6ede83c8710dac89ea503c4ac9388e365a21eaf5591c534fdc39816d91adc7204845d1f6ae6d70a537f651

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    54KB

    MD5

    b6ccb8be69b5c74a3531e8cf774ee194

    SHA1

    2db8502516b463554d9277310bff99cce9e14d46

    SHA256

    7c6dcf93713e6569e4f5fc50ce4088f4f0a17c35bd0c7571872a42902edb603b

    SHA512

    1cc0f67f53fd446501f95853447ae674802f5c8b77b1c9be4e59a8edea03c313331ef7960015e327a21563d323ec7a349cbe8d9ca2134de032adf28ff40a46de