Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    13-08-2024 22:45

General

  • Target

    99c478eefa0594dc408bed7df5b352e7fb95a9aacf500c90eaadb7d5994deb29.exe

  • Size

    39KB

  • MD5

    4291beada56be21cd9aef90c9bf47b23

  • SHA1

    d7739a0b851104ba7c72cc71fc0672c9a3eec03b

  • SHA256

    99c478eefa0594dc408bed7df5b352e7fb95a9aacf500c90eaadb7d5994deb29

  • SHA512

    37d2821585b78ddf04636d271a0b1aa5fa199b0a42ef94acdfe2355b1511f3145fd6e93d105f3609f4a99720780d35d0b67db8c57c179394d705134303a3fafa

  • SSDEEP

    384:GBt7Br5xjL9AgA71FbhvuNBN2TQ1nrSLmnsNw/Nw6gQ2QF:W7BlpppARFbhknrSLmsNw/Nw6gQ2QF

Score
9/10

Malware Config

Signatures

  • Renames multiple (3766) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\99c478eefa0594dc408bed7df5b352e7fb95a9aacf500c90eaadb7d5994deb29.exe
    "C:\Users\Admin\AppData\Local\Temp\99c478eefa0594dc408bed7df5b352e7fb95a9aacf500c90eaadb7d5994deb29.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2396

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2172136094-3310281978-782691160-1000\desktop.ini.tmp

    Filesize

    39KB

    MD5

    6916c1b1f5eae6f11b4f960557896348

    SHA1

    b99ab7b70da097ed922e941f08e1ec2ae887d87e

    SHA256

    d7b770f76812596cf111ae6c0a60502b92a3dbd75cd9bf554391bc96596ba798

    SHA512

    dd6e363087a4ef789310759dbfc27c876ecc2bc322a528a6c67f3801208fc4489016cda4873d15c9517c8e7461a4edae85f62224dcb8a0ea40c9fa367a06cab3

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    48KB

    MD5

    be7392d58ab7be2484e80f2604b64d3c

    SHA1

    8faa9cd62113f8b395b431a9702402b1c02acded

    SHA256

    16462ddde41ae045730b20f58694d148fa400a024a4091bf72d3f4148492e500

    SHA512

    6d387c672afb7fe52a5c1e3829e2c82dfeb7d886026d84e6c4aa17328241f0f381c2756a8f4ce6f0c254f800d385391b18c9dae9ee5636a0f419b325adc90823