Analysis

  • max time kernel
    150s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    10-08-2024 21:16

General

  • Target

    49f9f2b311ac723147121eb717fb998779674257791e2bbc871cbd3c458adcfc.exe

  • Size

    198KB

  • MD5

    b8e0f9f97e599763a48745dafc5c7e23

  • SHA1

    90cbcc80926653fdcf30d15f66487b6b9a3a4b85

  • SHA256

    49f9f2b311ac723147121eb717fb998779674257791e2bbc871cbd3c458adcfc

  • SHA512

    926bc238d85a8ffd5f471444183d6bab0cc69204433eb29b3695b338964180c4f3017479e5dd5e5446f41f24957adc8fa039b952c1dba4a777ab7ab3a93b647d

  • SSDEEP

    3072:6e7WpMNca3rytOkWpXfnYRl2l/9HSFHzJ0lBJTzkQ:RqKB+tOkWKR0iJ0lTzkQ

Score
9/10

Malware Config

Signatures

  • Renames multiple (3319) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\49f9f2b311ac723147121eb717fb998779674257791e2bbc871cbd3c458adcfc.exe
    "C:\Users\Admin\AppData\Local\Temp\49f9f2b311ac723147121eb717fb998779674257791e2bbc871cbd3c458adcfc.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2384

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    198KB

    MD5

    893ba46adb999741756c5c5e5491529d

    SHA1

    68f44bf4eed7e884af14e96272d053a13e12bfb3

    SHA256

    0eb363f0a9c30de878704d2943da75cb9a4ee0e05b511115846bf246d4c8e337

    SHA512

    4d3700ea70e4d55181e4694ac53f49cec3f9a8665e7a4efb637dbc2c2e55c56323a52ba0b78fcc956f6c39282a992edfba11fdc919c0c77b4228ce410c058d1c

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    207KB

    MD5

    34d7bc3f1fc525456fed54f77d0988f7

    SHA1

    5b2ef9a5f1d07921b5dd3bece6fa299f969ee6c4

    SHA256

    f23f9b48d0fc8af9552e73e7c512a75a43cfead6bf0e926c19898c013c23312b

    SHA512

    105e8db3eeb0336dee86b0e3c29cf22d44c0498a057db8f94e761d42dd660ff30c17b89a33e40bc29c913ca6d668acdeba5a6539a81b7ae6d8e103a44f4c122f