Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    17-08-2024 20:00

General

  • Target

    2448e90045d8872f02dd157885e3332da27c67fe076d2765fccaeed064245845.exe

  • Size

    74KB

  • MD5

    f4c00f4120cdb980ad95667da3ed93d5

  • SHA1

    8a66440ed6c10fb7eb09ebd7a65e10f1eeadb09e

  • SHA256

    2448e90045d8872f02dd157885e3332da27c67fe076d2765fccaeed064245845

  • SHA512

    4453c975a43af7511159843471f2dbc766d211a374b63da340b85b714367cb5bf880f31cff09caa652630c0079a26d86fc1e58d28ee6396a99e7e1eee0feed3b

  • SSDEEP

    768:/7BlpQpARFbhIYJIJDYJIJPfFpsJcFfFpsJcC+3mC+3meDAfABJ6fABJwEXBwzEa:/7ZQpApze+eJfFpsJOfFpsJ5DieQ

Score
9/10

Malware Config

Signatures

  • Renames multiple (3644) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2448e90045d8872f02dd157885e3332da27c67fe076d2765fccaeed064245845.exe
    "C:\Users\Admin\AppData\Local\Temp\2448e90045d8872f02dd157885e3332da27c67fe076d2765fccaeed064245845.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2340

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    74KB

    MD5

    80f3b9ef9e8d743bf3bfb6c641b0430f

    SHA1

    241a9af1ed71ac278462b904aad351df59d88e81

    SHA256

    bf18602e1fa06177a9eca2859b346f86b00b61f9d3b00fda3dc44bf21fc14bb6

    SHA512

    dadbace3917437b2571fc92abd37cd32e8fac36eaabc33599e728b6db83f720b5df32c9094c643d49da9e8d181ee3fa6fb8d49257fcaa3b7f7db26e6c48d97ac

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    83KB

    MD5

    c851e0df8d604995d8f555bef1f56cf6

    SHA1

    4d2206c96caa50d8f5955895e829207e84e2d1ce

    SHA256

    3b3d58dd441e731408ff98a2de1639eed877eb5c084a3b11847cd0da135f9893

    SHA512

    162736a7e824a5e96d7e267f16e2c82df215d5309fffae5301ff7e58a994cd7f67c83183ab112b8e8e549b24aae4205b38dafda63ff9f11b6a60b78392581b0d

  • memory/2340-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2340-68-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB