Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    13/08/2024, 18:21

General

  • Target

    096e50f6b913b1c998d7958df2c027100355a73f5bbae8b3edfe81fcfe677330.exe

  • Size

    84KB

  • MD5

    bb95e444bc9ec64256ed50ec91a419d2

  • SHA1

    a81f1fbf4aa5e9eaf84299a1ebb5426930b51300

  • SHA256

    096e50f6b913b1c998d7958df2c027100355a73f5bbae8b3edfe81fcfe677330

  • SHA512

    55db6c639f298e84fbaacb6d58ec4f418315eacc62367e37f9b2e14fcac23ea96969e2a7799d81a8f573f3a31fb068f2450d7d11f3803b0ab55916fe775f21dc

  • SSDEEP

    1536:/7ZQpApze+eJfFpsJOfFpsJeFrxFrUgtVw2wjSh:9QWpze+eJfFpsJOfFpsJ0rDrXtVw2wm

Score
9/10

Malware Config

Signatures

  • Renames multiple (3611) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\096e50f6b913b1c998d7958df2c027100355a73f5bbae8b3edfe81fcfe677330.exe
    "C:\Users\Admin\AppData\Local\Temp\096e50f6b913b1c998d7958df2c027100355a73f5bbae8b3edfe81fcfe677330.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2772

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

          Filesize

          84KB

          MD5

          8574a15d880588b8f4a71b5166c8218b

          SHA1

          c05b8fc97865cb8f6c9320cdf24775409f68adc2

          SHA256

          65864f200c695a0ad6c6065db6535299a45f1ffefc4ed93c6f58bc7940f48d7b

          SHA512

          9317ba0ec4d022d164ead0dbc5ee767d92bfcf620b1551894b3ccb219be1e6128d24cae4dc0ff6188138f8dbee3dfdf760c19f706d2a7a5219de2371ca5ff815

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          93KB

          MD5

          6c958fb4704324adf9380e9d03ac0fc4

          SHA1

          d4826d47b19e1585920e1e9110eeb55e3c6a8d28

          SHA256

          b38e3b03c1a8ef7351c8804c2af1cdf00e36d5d32d76359bf2a96fab5c565d8b

          SHA512

          8c7fe5315b36e3affdd262da584ace114fbb2078460a6ba5d2c884d97052ce72f4673fc205a061d8b54c85c57e33aaffe7deeb94e277d1f7d45e6e7c8806b607

        • memory/2772-0-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/2772-648-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB