Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    17-08-2024 07:41

General

  • Target

    fa408d4c8f0616c3d7573b19a009621c15eda5538cbd34c1b815ad0e72163631.exe

  • Size

    88KB

  • MD5

    394da91b4bf223671e02979ff8aca712

  • SHA1

    45a2de4a2b74ec2307615d426c4cdf25658f7d23

  • SHA256

    fa408d4c8f0616c3d7573b19a009621c15eda5538cbd34c1b815ad0e72163631

  • SHA512

    68a85e2b424eca3cec0a95cf1114b62fb25660a6b072d534b9d5901fb1c7394bba3618d9b5bbff6e426afdbfd1c1e6ac689fa7a641d34942ca6f4fa8e8395244

  • SSDEEP

    1536:W7ZhA7pApMaxB4b0CYJ97lEVqNR7Yge+eTdsdYSWSYAk:6e7WpMaxeb0CYJ97lEYNR73e+eBSWSYR

Score
9/10

Malware Config

Signatures

  • Renames multiple (3638) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa408d4c8f0616c3d7573b19a009621c15eda5538cbd34c1b815ad0e72163631.exe
    "C:\Users\Admin\AppData\Local\Temp\fa408d4c8f0616c3d7573b19a009621c15eda5538cbd34c1b815ad0e72163631.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini.tmp

    Filesize

    88KB

    MD5

    3051a982d6d7948e5bc137bad5f81280

    SHA1

    421201c479a97597f0de0fcfb905447e23ce3ba2

    SHA256

    26ec6a7c5317009b943c18135add16d47e628dd41d215c8a269d61ee869bf18d

    SHA512

    a903fad6f7d29405b858fd3f40628b851c7ffd0d36d305f3ac9db750f31638721c5ace444629e6b8314ff96483ca4bc68d22357c5e92754fe10213e484013b58

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    97KB

    MD5

    33424103b30ab1251d1b09ff5785e2be

    SHA1

    e3a726e20c1d9fd2bc555b282f2f4e930ebf875c

    SHA256

    cc875c027c4b6bfb0e2e16c02aee273c7995f71a7edc1f20a4c7d91685f55415

    SHA512

    ecb767d930112f917ccaea890e47cf5aacba70a9e28073a56c8dec4381184eb9c7230f9231dead4e9048ce10163c6a6b15aeb1d511a33bf152c93156626f979f