Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    11/08/2024, 22:45

General

  • Target

    773f7c88d93338ddd7611ed305325fc41167c90f0b5333aa25a26df49498d750.exe

  • Size

    41KB

  • MD5

    946f76f5da2acdce52e10280c56c456e

  • SHA1

    96d377d033369456cd81ef39c2acf2ebf8b50bd0

  • SHA256

    773f7c88d93338ddd7611ed305325fc41167c90f0b5333aa25a26df49498d750

  • SHA512

    cb7536a7482c09f26c74336e71da70c4d7173911721171b6be15be5eacea3085d677febbe1690acaf01eb9c8def65f838eefe641dba5f923350ff0247dd1d9da

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfpXfxRfxaRHRe:W7ZppApBULcfpHLcfpXfxRfxaRHRe

Score
9/10

Malware Config

Signatures

  • Renames multiple (3786) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\773f7c88d93338ddd7611ed305325fc41167c90f0b5333aa25a26df49498d750.exe
    "C:\Users\Admin\AppData\Local\Temp\773f7c88d93338ddd7611ed305325fc41167c90f0b5333aa25a26df49498d750.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1384

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    41KB

    MD5

    6972ec47b896eda6b04c773d3bb3835c

    SHA1

    77fb3c224e6bfac9d7ca3f0b012a3eda42626d89

    SHA256

    b2c97c2073cf962af76e85f0845015bd5ff8257c1cea61fdf9bcc6932d2d9b12

    SHA512

    02cf264535560a5e657fe31783a762b0ad839f90f0bf89844d5311f586236e22a79426d10bd77f41cda4dc63cb05319619940f4ba74f4e40d953805f169101af

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    50KB

    MD5

    4310f7524528f222ed5ff2ed54898ac0

    SHA1

    87b240b92cb63d0f45b3c15bbf26f0429748f383

    SHA256

    b0a34f22e9ebbe1be1f3729ea822f1b4574ae1321e0a93fe8b09a3e5fd4f55e5

    SHA512

    2e2213c3e2429639bbbff8456530d9db677d452e0830981c4c338d40f2adc1cfdb6203bd80dcab7370e393369c7bf966dbf216e7bfe0a80b2814171ef72d25af