Analysis

  • max time kernel
    150s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    12/08/2024, 00:47

General

  • Target

    a67229ae69e6293ec90eebad2170d45ba0a113df4e89447544f3b7677c00241c.exe

  • Size

    68KB

  • MD5

    e006812a35736ab32b116583b216842e

  • SHA1

    9a1b193a6b485a58a657d31c8fee05e3c9407a4d

  • SHA256

    a67229ae69e6293ec90eebad2170d45ba0a113df4e89447544f3b7677c00241c

  • SHA512

    5cf3e2c8c380d4edd6901e39df75d72214a1ac3c54da42d7427cef538a67532153e0477b086011bdfdef8b0c0de2702e1aca64da10448afec6355f7cddde79eb

  • SSDEEP

    768:W7BlpppARFbhbt7Y7WBp9/Bp9S9dr8WbTr8WbV:W7ZppApRhS9f

Score
9/10

Malware Config

Signatures

  • Renames multiple (649) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a67229ae69e6293ec90eebad2170d45ba0a113df4e89447544f3b7677c00241c.exe
    "C:\Users\Admin\AppData\Local\Temp\a67229ae69e6293ec90eebad2170d45ba0a113df4e89447544f3b7677c00241c.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:828

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

          Filesize

          69KB

          MD5

          59555782fc90c1a066fa1cf701841119

          SHA1

          0c4eaff148b12c44e5b6b1b9f23aaa279dcd3baa

          SHA256

          cef89dc15572a8324b0f68ebc0376dcef3712d82575d6c2feda73b728c2a0cdf

          SHA512

          8cafa608664767b6a2f61b008ccae7197b522fbed289e6cc558107bb0c951936b82bcfd21453e81bc60be4ce86893794f6df702a8a992f2c35b217c9ef351988

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          78KB

          MD5

          dd4db18621483fe83fd41033672c0965

          SHA1

          bb15146a3a5cb642ad32bb5d4f1a58594f8a5a8d

          SHA256

          db91026ed4d9716f6f7ba010be5ff2e2767f5beafa4ffa944ce29c8f95d6cf1a

          SHA512

          c5e41810b5a7d230213fd6643b14e86410937953bc5dea748c54e3e2bbbfafb99623cdbf2c5d5895fe46dbafb95803da5093c2197b6081f20da99e7c5a9b3fe2