Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    10/08/2024, 00:17

General

  • Target

    96bccd5b4290aa8a8f45870b2b9f403c42def1052047c70e0a44fc0f0e7cc80b.exe

  • Size

    76KB

  • MD5

    1317a7016d3ca1162b5a312e992113ce

  • SHA1

    821438351b3293f61bf7df07c5d36a9123c67389

  • SHA256

    96bccd5b4290aa8a8f45870b2b9f403c42def1052047c70e0a44fc0f0e7cc80b

  • SHA512

    6a058b0272e165b14e86bdc6b93674ea863f9e21bae3bf604e1a0f50c1496582f4c82d1b755f9f5ddf88a5041604d7d9ada9a43149a8e3dc898d3b5dd9fcf52a

  • SSDEEP

    768:/7BlpQpARFbhIYJIJDYJIJPfFpsJcFfFpsJcC+3mC+3meDAfABJ6fABJwEXBwzEI:/7ZQpApze+eJfFpsJOfFpsJ5Ddu7eM

Score
9/10

Malware Config

Signatures

  • Renames multiple (3560) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\96bccd5b4290aa8a8f45870b2b9f403c42def1052047c70e0a44fc0f0e7cc80b.exe
    "C:\Users\Admin\AppData\Local\Temp\96bccd5b4290aa8a8f45870b2b9f403c42def1052047c70e0a44fc0f0e7cc80b.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    77KB

    MD5

    2756ed7225156f9de403d077ce9e5d7b

    SHA1

    cbdc6df5f23174390d14213e4e8734225884b97f

    SHA256

    0ea6d7fe2c53d94a308ecff1ee9bc7b28814dc083da39443a2010178f827d914

    SHA512

    c70e21babc11d76c6baa986264ea73fa3fc345828dc611c5703710cb7e53389185fac4ed7ac73e850d7230c191e320b11bfbed970cdbc99098d4b6e691adbac7

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    86KB

    MD5

    66f163593ba5acf2e29dc13afee310c2

    SHA1

    b8c7241d28b13becdcc776aaef2baab2e0d8b670

    SHA256

    623a4479bdcf1590a2efdf27927b4be114d942b3e2fa69f23b2073325c27180c

    SHA512

    0a43305266c5eacd7707e3f9813101f110587713bd53322cbfe6d62337cc601fa7139cb59ced3466f3f0369c07597b514f9ebbd06070ba44b704d0b2c57eb59f

  • memory/2712-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2712-650-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB