Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    17-08-2024 00:14

General

  • Target

    6c40dfade023fe220f64dd84f945dce094870db725b1e8f80f45a6af1dfe9242.exe

  • Size

    38KB

  • MD5

    ffe1a64d435b37073fd2a292e574ebe9

  • SHA1

    de6c2be2b6da8eac4f3cbd7fef6ac102803c2c5d

  • SHA256

    6c40dfade023fe220f64dd84f945dce094870db725b1e8f80f45a6af1dfe9242

  • SHA512

    88253431fdbdf1fb3514aeaf0c07a851dc1a0c0b1afafea55c2682d9d35042d24066e3e7adcab5ae9d4b5a36ead91d0948cb0a42db9866e53a17ebcef11a7cd9

  • SSDEEP

    192:pACU3DIY0Br5xjL/EAgAQmP1oynLb22vB7m/FJHo7m/FJHA9jxje6OMmy6OMmFMQ:yBs7Br5xjL8AgA71Fbhv/Fzzwz16U6n

Score
9/10

Malware Config

Signatures

  • Renames multiple (3872) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c40dfade023fe220f64dd84f945dce094870db725b1e8f80f45a6af1dfe9242.exe
    "C:\Users\Admin\AppData\Local\Temp\6c40dfade023fe220f64dd84f945dce094870db725b1e8f80f45a6af1dfe9242.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    38KB

    MD5

    afc91de1ae73829b576d6be499e3f053

    SHA1

    31fee5b47f55ac58eca43422990b399460062785

    SHA256

    40f2f46ded85a6715d0d25a9061bb5d6da5c5ee44f0e4a25bbc84b42cb7769b8

    SHA512

    088a7ee2e3f34967f02cf84fa73b9c91e50c8158ccd67abcc3e3353ccbfad346eb4ceb5bf03d73eafcdd046fd388c0ec28b24ad28a12c04472343ae980b41ff6

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    47KB

    MD5

    6149cc57efb482c9412c16daa0eaccd2

    SHA1

    cf9db1ee38b3e45cb0a42c25c88dc0a146d2b111

    SHA256

    6ca8e8bb204dd94de246329186ae833e6b65e3c1e134218606ab715ba06ffd2b

    SHA512

    2c9acf9eff9f6c149e2877ac82eca0cca9a2200287ad7241886b2d22b14998105bd0020ac686a9b7f8f3c98b9fabb0b1adcc72280727be21606380760f4cb6b8

  • memory/1392-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1392-70-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB