Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    13-08-2024 18:17

General

  • Target

    0755f8ae5d087fe8c72f904768981d1d1cd74ca3b2e6c04ef3797ad1b26bc9b6.exe

  • Size

    69KB

  • MD5

    e5e128a6d29b1ff2d53d9d43cb9d7903

  • SHA1

    e24fb160aaa3cc888b787efb579e5c35bf37709e

  • SHA256

    0755f8ae5d087fe8c72f904768981d1d1cd74ca3b2e6c04ef3797ad1b26bc9b6

  • SHA512

    9ddccaa3c79cc5aea168db53bede9434b8d70b11d6a6468f5b23f0c096c659de817f7d72672a51374e4c73c29a911f190042fca339db57d6e6002f6eeb12dab0

  • SSDEEP

    1536:W7ZppApkxUYU30NQn0NQaYepnpf64rDQ0:6pWpkc0NQn0NQiBXQ0

Score
9/10

Malware Config

Signatures

  • Renames multiple (3735) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0755f8ae5d087fe8c72f904768981d1d1cd74ca3b2e6c04ef3797ad1b26bc9b6.exe
    "C:\Users\Admin\AppData\Local\Temp\0755f8ae5d087fe8c72f904768981d1d1cd74ca3b2e6c04ef3797ad1b26bc9b6.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    69KB

    MD5

    3b9b174b9d626de58c8242511c2689a7

    SHA1

    5d751aa400e04cfcb820dcbc2727edbb092d4952

    SHA256

    2ec7954cd666c4691baca44b79cbcc24035e01647673c799eeb5cbc8b309dd35

    SHA512

    38b942a7825ccc3f7d6879483bff876f6ea6dc586075feaf9bb8866ede4cb36e5ebb8bb3407daf4d0bc40a7fa53ba9a8b2967e7f07f922081344ea3b4551d58e

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    78KB

    MD5

    943f7ad3086dce0b87108ae5811dfcb4

    SHA1

    ac2cf8c6ee41e7e40bddc76af94595b151218761

    SHA256

    443fe0514bb7675407a836b028501aa37ebadf3a92721b9758ab397d9f2ec791

    SHA512

    83d2daf9e673cc5dca75b0fe62dde58ab94d798615a20235600ca702816fc030766736a8ae18c66dd49d07b4bfb803b287d139c22f9956dbbd13ef5c3ffcf50e