Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    12-08-2024 01:58

General

  • Target

    c263d5ccdb71ed23f71f70ef66e0aaa05da6bb4d8e57e4cac1f56a5c0509e2b9.exe

  • Size

    36KB

  • MD5

    f76080774ed7dda11f7f1c9299fa5dec

  • SHA1

    29d24c14d28bd021a544919e6a508b8b3f68730e

  • SHA256

    c263d5ccdb71ed23f71f70ef66e0aaa05da6bb4d8e57e4cac1f56a5c0509e2b9

  • SHA512

    f4e6f5bbd71b49363c8e7da1eb8e4adf043ab86771e88eae7a7a67d268c0388abe493832fb34c746062c7195238407a063812d132a3b351065116b33e883dc68

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LOl6Sl5lttXT:W7ZhA7pApM21LOA1LOl6Al

Score
9/10

Malware Config

Signatures

  • Renames multiple (4118) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c263d5ccdb71ed23f71f70ef66e0aaa05da6bb4d8e57e4cac1f56a5c0509e2b9.exe
    "C:\Users\Admin\AppData\Local\Temp\c263d5ccdb71ed23f71f70ef66e0aaa05da6bb4d8e57e4cac1f56a5c0509e2b9.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1288

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

    Filesize

    36KB

    MD5

    009eb4cb392ea2df91cd3f67f43ba20c

    SHA1

    e0d75c294e3208a4a5156d0be7357f30becbb758

    SHA256

    61cafc0d081d9951fb708f9d01c7e4e0c1cbc1a1fbef9f5e278309a0de2b8cdc

    SHA512

    8adfd71f31c7caa2895895e39cbffa3c1e72b86b8b7c422cc1138ceb2cf0e17fa8fe3b93f531d87b16ab80e4b0af03b18acb7265098062368b200349081e1529

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    45KB

    MD5

    b4147bb0113b73b0ba0542e73e5c5403

    SHA1

    5ae9c3892ec6d0a2aae612f92cecad7cb60af258

    SHA256

    db5ac365a0cbf030e439d27f807518c1ed8670ccc0e96f90ae4c93aa94c002dc

    SHA512

    84ba1c84496e0ec6ce0f41baefaedf39505d24c173c0771857cbdf2f1558759445c82b9f9db6acc3be2cf978fe8e65ddac3c4065050e762316c9891c1351fcb2