Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    13-08-2024 23:04

General

  • Target

    a415fdc20adb8bfa56a0388bbaaa9d2d5c5d342e2446a76e1ca6816cd9fcf3f6.exe

  • Size

    49KB

  • MD5

    1b711a56391107a89fa68f5d1497df28

  • SHA1

    6b39709bb9672e8c20616a3baa8a2813dc93012a

  • SHA256

    a415fdc20adb8bfa56a0388bbaaa9d2d5c5d342e2446a76e1ca6816cd9fcf3f6

  • SHA512

    b41b04ab1e95cb21eca2cdaa97084fe471d11a335bdff16b26fe81c5ab864abf96aea297d10fadf33e269be6500128e56356cdf277c2c17dfcdf429e3fcdb82f

  • SSDEEP

    384:GBt7Br5xjL9AgA71FbhvuNBNKVkVYlIAItCCIntkntV/h:W7BlpppARFbhFAxC7ntkntV/h

Score
9/10

Malware Config

Signatures

  • Renames multiple (3884) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a415fdc20adb8bfa56a0388bbaaa9d2d5c5d342e2446a76e1ca6816cd9fcf3f6.exe
    "C:\Users\Admin\AppData\Local\Temp\a415fdc20adb8bfa56a0388bbaaa9d2d5c5d342e2446a76e1ca6816cd9fcf3f6.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2072

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2257386474-3982792636-3902186748-1000\desktop.ini.tmp

    Filesize

    50KB

    MD5

    cf881c0ddb4953e86677057d212a5f8f

    SHA1

    bb321d96f3fd5cd9cc3ed5e0851a957c25b1cd78

    SHA256

    b64fe630469b42eee66df8113fd6fae858547e4650a6fea2b1867dcd3e1b665b

    SHA512

    ac8be14b37512b835c09c37329875363c970b8189c4f5894bd5ec1f0f51f57520fe5331ddcebfcd04fa8c73cdcdd3a8a95564a1bfcfc2373c00ddada7437b088

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    59KB

    MD5

    b0691b994b8d1e6b11cea22acb88fb90

    SHA1

    65ffb1eda5d8a648dbd0a65fb19fa3e434f74ab7

    SHA256

    ec2b2814a6200df449e8a4eab496674fa2ba7ded10df4d6cbd5e4db039725f45

    SHA512

    07aaab2462ba1db073a0baede543469176bafe938f6f9087b947e50b484658bc5e5a766d51c23004f23edea61c307eb92afe405b5d75a183b10d0eb0f04ed8a5