Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    13-08-2024 23:19

General

  • Target

    ab7e9e2cd170fc164614e4ca0b1e5471c3ba064dc52efec49da0c37b7cd203f1.exe

  • Size

    77KB

  • MD5

    45dcb50b97f313996609b910b16ebc4c

  • SHA1

    8caa5b5710a5ff6ae2403f90b65caf46e1346f89

  • SHA256

    ab7e9e2cd170fc164614e4ca0b1e5471c3ba064dc52efec49da0c37b7cd203f1

  • SHA512

    b97d5aa5cb0f21560ee3ba7fb3104c6a93b724c353fcfe459d088e8817824a076684c32f461a9e7b2c61b52113bb0c3333549c067bfd94e7648aa39b53eb49a4

  • SSDEEP

    1536:W7Z+pApfGQ3y3RWvfmRfm9sKsSd5ifzWrWO:6+WpDfmRfmhSfza5

Score
9/10

Malware Config

Signatures

  • Renames multiple (3730) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab7e9e2cd170fc164614e4ca0b1e5471c3ba064dc52efec49da0c37b7cd203f1.exe
    "C:\Users\Admin\AppData\Local\Temp\ab7e9e2cd170fc164614e4ca0b1e5471c3ba064dc52efec49da0c37b7cd203f1.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2257386474-3982792636-3902186748-1000\desktop.ini.tmp

    Filesize

    78KB

    MD5

    219550ff542d78c2c49358f8e27025e4

    SHA1

    1672e883ad26488878ddbad91b6e13a39336f76e

    SHA256

    f079167d86b827a84b4b2a5242d9a351582077088e8655ba0c2b23a3a6aed848

    SHA512

    bb4dbbf9989a9fc9045fa0f6d54af07295ae5d3a28921f0dd3cb96a2aa7becbc304189162bcf15d7d24646cc356b677f8422971a52821f2d3a0577cc8896e4b4

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    87KB

    MD5

    4e716b8da362b6ba66ee1877bdb43a13

    SHA1

    c4865b268b018016141b16d4e0bd068f0b1d5839

    SHA256

    bc4827687723e206c4d33ac4cb43f61e9eb939365a44b2c876e804d3b667a908

    SHA512

    690240e0f270215ff2396754ddfb1b19e8c95fce474a104f55453718837ad6037b29e263436eee9397de300ac3347a92e93356a7e62b39beebf9890b2e3d7aff