Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    14/08/2024, 00:06

General

  • Target

    c69d54f1475c7e654e823d76527573c3ec2d8140cec76120ba41cee8e10ebe7e.exe

  • Size

    80KB

  • MD5

    07aacf02b5de8fbd8373b3c2b9ce45cf

  • SHA1

    b269770ba33a87e6c3a545c9128d1d3e58aebee2

  • SHA256

    c69d54f1475c7e654e823d76527573c3ec2d8140cec76120ba41cee8e10ebe7e

  • SHA512

    be37c8a8816ed39bf8d1405b1a97f38800650077265d017509bb37b48dd03dd2df7ac41b249f15d51c1a1b621187f85c65ae36afeec611c0d3659517c45e669e

  • SSDEEP

    1536:/7ZQpApze+eJfFpsJOfFpsJeFrxFrUgtVw2wN:9QWpze+eJfFpsJOfFpsJ0rDrXtVw2wN

Score
9/10

Malware Config

Signatures

  • Renames multiple (3563) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c69d54f1475c7e654e823d76527573c3ec2d8140cec76120ba41cee8e10ebe7e.exe
    "C:\Users\Admin\AppData\Local\Temp\c69d54f1475c7e654e823d76527573c3ec2d8140cec76120ba41cee8e10ebe7e.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

    Filesize

    81KB

    MD5

    9a8e71cd44eafc4408434ffa151e2d0d

    SHA1

    278dedbac01dbcd1956819926881d60e96a475a3

    SHA256

    bfa312f8fdac7f4f5b275ca2eb4657e3143de56c60569b46c94d075b7e1e0f02

    SHA512

    fd56762367d3ca398ab0b8a82f7f9572d7f482657e87d74d433cdc6401fc0ac9e6ba338e0b62595d5b9de42c57b36d79c838dfa74e8749dab364469cc3fbb000

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    90KB

    MD5

    6692cdb031a4e0be955b1d1819303103

    SHA1

    e70d637ddf6fea3fe0499a228a21003deb7b6c4b

    SHA256

    d16114deb07d1c3801a914ee819ad3431272876279d11a96e009b9725e38734b

    SHA512

    f045886fa9ec1de2e1179019641b865c217c324e9aaef06f34982beee7d8d0660b96cef6614ad9f0773e4317dadb98fbba5b03e52f87c6b3bae2c00b95e8e993

  • memory/1472-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1472-658-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB