Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 04:21

General

  • Target

    a6ddbb6e060973beb7a6fc0df8abb940N.exe

  • Size

    87KB

  • MD5

    a6ddbb6e060973beb7a6fc0df8abb940

  • SHA1

    0a1927e75c899d343a2ef5e61c0c76f9e8dda0f8

  • SHA256

    b8a5027c02c38dad021b7eeeec8d2225c0853a2c719564350227caf244b1830b

  • SHA512

    4bad6740000fa060b4871e7289c175a06ddd76fbe3e3a7c07762abefc7a4e99007b2447829bf269ca1891f8758e4dd4f5a733e486c2b9d97ae1014b35a619f7c

  • SSDEEP

    1536:W7ZhA7pApMaxB4b0CYJ97lEVqNR7Yge+ejy0Wjy0WzYo:6e7WpMaxeb0CYJ97lEYNR73e+eGGP

Score
9/10

Malware Config

Signatures

  • Renames multiple (3048) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6ddbb6e060973beb7a6fc0df8abb940N.exe
    "C:\Users\Admin\AppData\Local\Temp\a6ddbb6e060973beb7a6fc0df8abb940N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1716

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

          Filesize

          87KB

          MD5

          07a769acc13ac3fd1b44db65afe32f59

          SHA1

          430de258e34666151044b396e88386c57588fc3a

          SHA256

          d09e1539b5fb066f3c413878af27f316796fe7c0b4a27afea8cf608cc47235b2

          SHA512

          515c22c92e41a26426cbe04d2a2b2102ccd1ecf0a7e1c61abb78115f954ba7267dfb86dd3d3278e095efe659fc7e8612fb2ea5b46c345f38c4b7566c0e4cf049

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          96KB

          MD5

          946dcad1d112b6d84f44932b13601861

          SHA1

          b2e208ed479f2b456b9fdeabab8e17526ba18f66

          SHA256

          c0178b6a4ccf31c53bb9ad476428cd939ef11a6c8c8aa27c2b21919f9701f363

          SHA512

          45dd6b22f8584794745943ce2958e2d87cbde56d9dd2968bec1f8bc1912247240e423e7529cdea3f8d5fb86ddea3fe8ac9e09aa3e1a395e558e7ebc34b2ae72d