Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    18-08-2024 06:46

General

  • Target

    f8c94acf3ef48bd2d02bcd4656d6f3f80c1a88fdd577bdce05cbe0aa2db925a5.exe

  • Size

    52KB

  • MD5

    7c0d0817c7785fa57e89e6ba6b81369e

  • SHA1

    0c4b56ae4b8dd22a199f7fe51e94cca21d381614

  • SHA256

    f8c94acf3ef48bd2d02bcd4656d6f3f80c1a88fdd577bdce05cbe0aa2db925a5

  • SHA512

    440de04312021a4ae82a50131bbfc7f8a2891cc405d126862a882c024fc4369d27225313e137818a981ecd049a8e03f2266e6891dc6c6dce50b5b16f4e3ff5b8

  • SSDEEP

    1536:W7ZppApBULcfpHLcfpyDoAQeLeAeLeJ0Jz2giz2gW:6pWpBwchcwD8z2giz2gW

Score
9/10

Malware Config

Signatures

  • Renames multiple (3769) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f8c94acf3ef48bd2d02bcd4656d6f3f80c1a88fdd577bdce05cbe0aa2db925a5.exe
    "C:\Users\Admin\AppData\Local\Temp\f8c94acf3ef48bd2d02bcd4656d6f3f80c1a88fdd577bdce05cbe0aa2db925a5.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    53KB

    MD5

    2a896dcf05b3525b5c8611ca5cbf4401

    SHA1

    b21b34db458d4aa8c22eef08809badc7043db199

    SHA256

    7c160e44d2b9de886c77989ad3fe99fa4c23760e81e7808a68512cb07060086f

    SHA512

    eac5e00a0d21e0168580f337f7c716113788762e843532ca284b1337a6389dfac06940c805df7fcae57e1f3d2ad0866f164e277eef90fb5f495599d772ee59a7

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    62KB

    MD5

    55654392985b17ff0b8eadb6cee9c9fa

    SHA1

    56ff4caa9d87b6bb96cb3c5a6ea750bd8934ea31

    SHA256

    97c9d7c9f59a932065f70f1c4e52260aca9849df1686ba19dd49b72c998dfc03

    SHA512

    2eecc986be65dcd20bab39a04cb4b632fdda3d9074dd9a6790361c8b3f458282868f1bd69eeb9bb68fa15740eba44ecc55f9c77975def88de21efb5b7cd3da25