Analysis

  • max time kernel
    150s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    13/08/2024, 23:11

General

  • Target

    a791bfcb06230afc0943a597a4c8b02fc64ade9395f3b79564c299fcf9cdfd98.exe

  • Size

    34KB

  • MD5

    6bfb04858152de5d46298a316c2e51d8

  • SHA1

    37c203f94814b02e1f606976028bb6db388d64ad

  • SHA256

    a791bfcb06230afc0943a597a4c8b02fc64ade9395f3b79564c299fcf9cdfd98

  • SHA512

    31257adaca022273e4563a9fe4420f7bd49c7c5192e27eee9e27886cd75c1e8d8746be1b1562ad879aae6336b7dcf17af106aad9f762e228d6487d42a42789e7

  • SSDEEP

    384:GBt7Br5xjL9AgA71Fbhv7bhvo42L5FgAytBpR42L5FgAytBpKU:W7BlpppARFbhjbhg42LcfpR42LcfpKU

Score
9/10

Malware Config

Signatures

  • Renames multiple (4110) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a791bfcb06230afc0943a597a4c8b02fc64ade9395f3b79564c299fcf9cdfd98.exe
    "C:\Users\Admin\AppData\Local\Temp\a791bfcb06230afc0943a597a4c8b02fc64ade9395f3b79564c299fcf9cdfd98.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    35KB

    MD5

    e254bf5044695dfb17306d84ec1d4dc5

    SHA1

    faa76a5971df47eed149b82141a842ba99598442

    SHA256

    e3164e2d66cf6c4939adfe6a66361cfa9b28ab81325b9535f64553260f157d07

    SHA512

    aba3687f25a6dfb781597d94ae8eb71e70dd351b0685d6ba701164437e231fab4759cf4df47b0d1a6de23715d44093dd9043252cd1a8d17b23d8e44363539929

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    44KB

    MD5

    2e8b1f554bfeefa1014cf8011af38d82

    SHA1

    9bf2a9ad6be183bed188aa378b40df4a9694c429

    SHA256

    ca54dd66eadb45c7c90c8b29993fce382c0c0b9e210d3dddf3e270a816560f08

    SHA512

    32195c380153754aa67b6076269ae738eff7d4a3cd675dcf7f7fc9a853e4253e50a3f5c0a1a0e2c8dad672b81f18a467b7fb8da359c3d2289906cfa8c40f88fa