Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 03:45

General

  • Target

    ae04d64c7419765b05a179e95efc1fc40f7f74d8144c65fddbe85a7867ca90de.exe

  • Size

    40KB

  • MD5

    3c1f13ddbacc2c7e220443b391150085

  • SHA1

    7d93da20161e224651c80f73a6714fed05fdd2c8

  • SHA256

    ae04d64c7419765b05a179e95efc1fc40f7f74d8144c65fddbe85a7867ca90de

  • SHA512

    d854edf19ffa8ca1f1d60ad75e8f8d33578bea4257790e859d64bafdaf6958a041da9189b1c430c769ddeb83b3964a22ba6b35d2d2d987306ed937ffa81ccf16

  • SSDEEP

    384:GBt7Br5xjL9A7AgA71Fbhvn+nDm0CAmmLg5Ms7spsZ8HYGkqvtJ+JzNANQ:W7BlphA7pARFbhOm0CAbLg+sJ

Score
9/10

Malware Config

Signatures

  • Renames multiple (3800) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae04d64c7419765b05a179e95efc1fc40f7f74d8144c65fddbe85a7867ca90de.exe
    "C:\Users\Admin\AppData\Local\Temp\ae04d64c7419765b05a179e95efc1fc40f7f74d8144c65fddbe85a7867ca90de.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    41KB

    MD5

    5bcc731a86a5aa01b54d7d6e9da56b3f

    SHA1

    26ec1b0fae7206603589e6362571bae1875d67b2

    SHA256

    970cf4e5e55ee195e34efac2ad18d7c2fe02ac5f008c6b0102640febe34efc14

    SHA512

    b5208372ff31fd21b37675b6f84cba9d51e11a9fb0f22c9d38262ddca76578f29f65e4f92dffd1ec07c1e8177011a1568a89690d51cee4896e8d56b3d858d22c

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    50KB

    MD5

    3d009b2f9500552d32294fa7fb6b4903

    SHA1

    63a0be83f176f9863863d0a74d640fd588c6c34a

    SHA256

    cda99bfd1142839923ace5130fd8a4c149747052ff1f0fc28699e895a4dff8f5

    SHA512

    82ed2c3249f5119a15419a17c3e32a754ae6abbde5fbe7a2021a7bfafbc88ceaaed4a1e1005735ee9f47d39f9d780b271925fbfa3406167ebb1935fe0f871b98