Analysis

  • max time kernel
    149s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    11/08/2024, 22:48

General

  • Target

    78c5667759cbbdbe22912b3a13e2b8243f687ffac5a1e31dd16cee5aa0cab114.exe

  • Size

    95KB

  • MD5

    dd8f804b887c8b6f05cbcdd451be1cc1

  • SHA1

    c98e5352d4529cd43c9d8152c9ba2c73b4999541

  • SHA256

    78c5667759cbbdbe22912b3a13e2b8243f687ffac5a1e31dd16cee5aa0cab114

  • SHA512

    50496405f4fd34b5480dd77641e4ef763736f78044bbeafea374cc8428002c547accaa80392faa43a59d5cace54738aac7ef38129ca8f880571bc75d0f44f547

  • SSDEEP

    1536:W7ZppApUFpEhLfyBtPf50FWkFpPDze/qFsxEhLfyBtPf50FWkFpPDze/qFsAcEh5:6pWpUFpEhLfyBtPf50FWkFpPDze/qFs4

Score
9/10

Malware Config

Signatures

  • Renames multiple (3532) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\78c5667759cbbdbe22912b3a13e2b8243f687ffac5a1e31dd16cee5aa0cab114.exe
    "C:\Users\Admin\AppData\Local\Temp\78c5667759cbbdbe22912b3a13e2b8243f687ffac5a1e31dd16cee5aa0cab114.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2257386474-3982792636-3902186748-1000\desktop.ini.tmp

    Filesize

    96KB

    MD5

    e1f07e52c9f7ad77b0035e8297cd3bc5

    SHA1

    d4c16ed5e9cd794a2b59311fed0f4703e030359f

    SHA256

    d6cf3ab02e158c654aa88bf16ab79e2e574e81af2027bc6f8e64b3eaad74d108

    SHA512

    b261f3b8a825ba633e71a98d8c90ec88ac28c926bf36dfcf0b3bdeaa5a5413af136665b024b7716b9752b44f5c39bb7064fe8616912fc4d82d9cf1f73bc2fcf6

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    105KB

    MD5

    9a94a9d06e10f8817e0dc15e51192adb

    SHA1

    d293f3c86068c781c1f4f6c9ca703d084ee2212a

    SHA256

    2ba47883d3aca96b36eeb727effa44cfee4081b8deb7a0fbc3a3cb86cb56623c

    SHA512

    45ba6db2a5f22e9d5c2af7bc54492f8ef064b9299597b3a3a87440377b1ddf3d9a1d4e01a86d5ef655d81d56c516ab8edb4ec3d04cf15ee6918c493f181d523e