Analysis

  • max time kernel
    124s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    14/08/2024, 01:12

General

  • Target

    e62845dc1cc79d2efdf3684651f5a211a502aac909ab5ea0e0552c3944d1886c.exe

  • Size

    231KB

  • MD5

    41cbf5bdb3b613317d2e7f78175c5d51

  • SHA1

    18471178d4daa0f96d4b20563acc54223f46ad73

  • SHA256

    e62845dc1cc79d2efdf3684651f5a211a502aac909ab5ea0e0552c3944d1886c

  • SHA512

    3a464ca6e2f061b8eee082b9938823f93045218c24dbc3251b1fdc6a4013cc132544a6f2f31e355ff2f3973f4c4bbcc0cfb71e35133a964e9de69a375a3f1079

  • SSDEEP

    768:W7BlphA7pARFbhKKVeIuKVeIBt+OKObYhnKhnZS+2w4Vqx0VqxzFtF2TZE:W7ZhA7pApBt+OKOsZKZZSjw4Vc0Vcb

Score
9/10

Malware Config

Signatures

  • Renames multiple (2644) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e62845dc1cc79d2efdf3684651f5a211a502aac909ab5ea0e0552c3944d1886c.exe
    "C:\Users\Admin\AppData\Local\Temp\e62845dc1cc79d2efdf3684651f5a211a502aac909ab5ea0e0552c3944d1886c.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1152

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

    Filesize

    231KB

    MD5

    64807bd5b10a869b70709c8f7791db30

    SHA1

    ecc4aa19006ee1a053055f8f7e344fc5ae24bcd4

    SHA256

    7b1ff63c3f32417d5beb82efa1322eb7eb9705c232ca8897d485d98f680e4927

    SHA512

    63cb32155cb28287bec12b411cc60b36e4c2d6f5d3c4ae2e2b3669372167cbabb3aa5cc3ce0bd7ee8e494fdcbe7d70d4d113b06ce091ce0be3774498c17de631

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    240KB

    MD5

    6cb803d7a4f3f01b491dbaa0c6a6673f

    SHA1

    c91bfb3952e4c905ff0692c1ca4e405ba2f550bc

    SHA256

    3bf4efb517a25ffe62b1fded8fb3bb7d0676c8fa28c17b31c54a40989f04154e

    SHA512

    605ff3002b3bc3fdea4660dfdac4623e4c9341e24f5a50f1cb06b2ca1e06bbe4de608aee4206d95f819b8b58ed21bfcc8fc1565507595bdb05e23a0342112774