Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 18:49

General

  • Target

    0cabd6384abe1d46159d6a37c893d0d7c4e0625ced21659d7293e8aceacad198.exe

  • Size

    48KB

  • MD5

    51fd1daddbddccd1199e34530379e64e

  • SHA1

    2a8965f0eaad5673637c863f683cdb84a927adc9

  • SHA256

    0cabd6384abe1d46159d6a37c893d0d7c4e0625ced21659d7293e8aceacad198

  • SHA512

    9c67073176a292c45b3f49380e9e6494898e35edf6463d57de5e466b7083b463da0e90f33b338831de5a249f51430924752479c2511f015a3a0cf1ee45a34ac2

  • SSDEEP

    768:W7BlphA7pARFbhL801VvM801Vvv7cY9xTMaa1xTMaav:W7ZhA7pApw03vR03v4Y9xha1xhav

Score
9/10

Malware Config

Signatures

  • Renames multiple (3697) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0cabd6384abe1d46159d6a37c893d0d7c4e0625ced21659d7293e8aceacad198.exe
    "C:\Users\Admin\AppData\Local\Temp\0cabd6384abe1d46159d6a37c893d0d7c4e0625ced21659d7293e8aceacad198.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2112

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

          Filesize

          49KB

          MD5

          1b0225c90718547534787ebc411bad60

          SHA1

          9722f3a506c156d228907bf988913ffea88b1802

          SHA256

          4cbd66e633cae945786b1772bd2d6f0bcd9df179db954d05adc7e1359345a4df

          SHA512

          8d0c4a26fe77f38a247b401eb5a6a5658590a14840f700976420fbc143544d2c6d6b0d3a1f0c820e8c65bfb743343bec849a474bff60027bbb43db6fb4001978

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          58KB

          MD5

          e4e9f3436bab9bc4106d4b05bc69ad3a

          SHA1

          e8a55d42f96171baf258424ba7db92906990d0c1

          SHA256

          017e84982b65a3251f7fd04f8541f3c5df93a4be011d7d5c168882086b2d2639

          SHA512

          95b672f7b90df21dd6aaa03fdc3611035b46b4bebaa4a373279da051fb03a69cf9392e749ecae9310eed4e45f4c3599373a337e5263558931430768159d53514