Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 22:51

General

  • Target

    5de4aa487c42147fbfe6f38756464fa2415cd861e1d936182f705c65443b16af.exe

  • Size

    45KB

  • MD5

    1396cb40b43da85a63c40a878de5e731

  • SHA1

    78b713f0f77b9c4099dda6869c444c1ea42787e9

  • SHA256

    5de4aa487c42147fbfe6f38756464fa2415cd861e1d936182f705c65443b16af

  • SHA512

    4e74cd552d5b68db20f52092b53b261c525d6a2ae329fe7d338cb421ebe49212f0a4162c7724a7f16880200ea37c4e93e8b13d50039645ab49a6bf128deab83c

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfproFNFjqAJLOqAJLkEQZqa:W7ZppApBULcfpHLcfpyDLqa

Score
9/10

Malware Config

Signatures

  • Renames multiple (3811) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5de4aa487c42147fbfe6f38756464fa2415cd861e1d936182f705c65443b16af.exe
    "C:\Users\Admin\AppData\Local\Temp\5de4aa487c42147fbfe6f38756464fa2415cd861e1d936182f705c65443b16af.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    45KB

    MD5

    47fdaa567b1ce1a78898e312cbf61d7a

    SHA1

    1fe56c58e19b5c70ec472cb8d113686a5a05c24f

    SHA256

    b7b5e8866781f37cab4e33e71ee045ee91b4b62f6b14e0a55371e11ea917f738

    SHA512

    896cf1783bd4a6f587178322f7816275f39712aaff81716565679710dcc66585536172aaa6be53cd06a4912b11f3559465feccaec2c562c62e58cd2082844bc7

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    54KB

    MD5

    33387be8e1ffb38d58e07c0ff621061a

    SHA1

    560186b472a82a4998399493e61ead393920d178

    SHA256

    02492a67563572dd54af04a932da373b1e72a1bb32ea3beb9503e7776674d081

    SHA512

    10bc4215d3361bfc6bd7f2f099dadab93399141e336eea8994385c1adbbdc13e536fcff7f001ec0e09bda0e446ef0666bd93df6f2d4a64a9d19e090c2ebbb8ac