Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    10/08/2024, 22:21

General

  • Target

    66a4ab3187879e74c67793e1a048fef59fbff7114f621e4ae1cfeef98388aafc.exe

  • Size

    42KB

  • MD5

    cb90cd040d211af80d5949b5cb8731b6

  • SHA1

    4ea1887c3db523c46e50b32218123ea4c7f440ab

  • SHA256

    66a4ab3187879e74c67793e1a048fef59fbff7114f621e4ae1cfeef98388aafc

  • SHA512

    46a28454fd9ea1ac4cae79cc3417ede5bb854f5992b869e5beaf8a48b43c85c16bc9ba77f282fef73701361dc3c24c2e09f167f0d52afa0887d89922dd746ea6

  • SSDEEP

    384:yBs7Br5xjL8AgA71Fbhv/FzS5c52dgS1AS1v:/7BlpQpARFbhdS5c52dV111v

Score
9/10

Malware Config

Signatures

  • Renames multiple (3823) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\66a4ab3187879e74c67793e1a048fef59fbff7114f621e4ae1cfeef98388aafc.exe
    "C:\Users\Admin\AppData\Local\Temp\66a4ab3187879e74c67793e1a048fef59fbff7114f621e4ae1cfeef98388aafc.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2232

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

    Filesize

    42KB

    MD5

    749c1db34ee67e2fd2974687617c384a

    SHA1

    b1a0856df4d8d0023d325e61cfd405eb74b1dc20

    SHA256

    190379f20eab1478fdbc52562c48b87f3a807932934a15b01ebafde6e60fc49e

    SHA512

    bb36de76feaa8c301d423b7eae5973004208ed37ee6eed49fa741b8cefca6a2659bd2f654225ecf611a9dd3a00cb1144c6ccc38f0dd4ce83aa775e8a79ec1d6b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    51KB

    MD5

    7ac90a6ced19a06b73c080934b5f54fd

    SHA1

    15dd35ad2e69a4832c0c75d4e6fb2dce78a9cb5c

    SHA256

    8ef063da4173f5f0b47b9f669d60f1fefdd821625e6185d53d820cf8be27e043

    SHA512

    db21c0915b7b14432de0b2731ebace46074341e6d2090cf5df2a9c41ad991e6b1efb70580cf865e43d4ed50164ff353ec654800e5b79dae044cd8a4242ead996

  • memory/2232-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2232-664-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB