Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    17-08-2024 02:44

General

  • Target

    9bff3bc81b9710bbfd0ba1db7011022bb2051a2f7352a4696dd9763f8d035572.exe

  • Size

    48KB

  • MD5

    e2b01d6171c15e1c07139b99384f2c13

  • SHA1

    e975a6676bcbb106b99e10f1a3d67cd367845cb3

  • SHA256

    9bff3bc81b9710bbfd0ba1db7011022bb2051a2f7352a4696dd9763f8d035572

  • SHA512

    4abf1a33247fe7633084a8ccda68296f015fccdcf62219ccd84a96f88fac78f1d6524fb1eb306c3d5d6ae994409ce2610aacf4c143567737c15304e20b29f249

  • SSDEEP

    1536:W7ZhA7pApM21LOA1LOl6vSDeNl3NIw3NI7:6e7WpMgLOiLO2Sj

Score
9/10

Malware Config

Signatures

  • Renames multiple (3780) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9bff3bc81b9710bbfd0ba1db7011022bb2051a2f7352a4696dd9763f8d035572.exe
    "C:\Users\Admin\AppData\Local\Temp\9bff3bc81b9710bbfd0ba1db7011022bb2051a2f7352a4696dd9763f8d035572.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    48KB

    MD5

    f055f25c962a387a6d477794bc6afa9f

    SHA1

    6943a7f2d4ff4e494c9204640376cc2ee2536d8f

    SHA256

    cf6068cb8dc9c9124e97b0fb011ec8acfcccd17fae859cc1a154c6e418d383c9

    SHA512

    0b6b991b2987b93df9414ef2ce500b2eee407a49578614d4fbb7c7736859453b4ab2437c980b40be3f0d40b8c1213966347aeb73523e71fa548f7ea6fae64e65

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    57KB

    MD5

    1bd386b83c9bb36b16063ce67ec38303

    SHA1

    e8fa70c204cd8e2e84642eb3114a1890d52592b5

    SHA256

    f3b227a3e99785458dc3a743213fa711c8d9fd8b1035279605dc41214ebb7235

    SHA512

    2f8f89918365c62f4a5cb6f347be6cc90f2104a7a4b3a3a5b53718a284a9d2d9fb8dc160300d3e2d7a440ca1df18c8e33f9b770035f2fe33ec6dc4f28fba53a4