Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 18:58

General

  • Target

    160b94e32b408b96f3791a1e46ede8c06152ee85cdd267e598c4a19765fba218.exe

  • Size

    195KB

  • MD5

    5e3da90b53834144e26a335027356de4

  • SHA1

    4ccee86ac98428534eac191ff0181c9f2f4e208d

  • SHA256

    160b94e32b408b96f3791a1e46ede8c06152ee85cdd267e598c4a19765fba218

  • SHA512

    e0750d71923995d7d7407917dae1291cc33fec3879f75bb344afd233b7af35ba7a826e506e171be0bd46fb8df7d8e0151e25a7765aaaee2cf46dc695b9fd2b80

  • SSDEEP

    3072:6e7WpMNca3rytOkWpXfnYRl2l/9HSFHzJ0lBJTzkI:RqKB+tOkWKR0iJ0lTzkI

Score
9/10

Malware Config

Signatures

  • Renames multiple (3214) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\160b94e32b408b96f3791a1e46ede8c06152ee85cdd267e598c4a19765fba218.exe
    "C:\Users\Admin\AppData\Local\Temp\160b94e32b408b96f3791a1e46ede8c06152ee85cdd267e598c4a19765fba218.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    195KB

    MD5

    3661a6466f095e5b405cefc754690dd7

    SHA1

    0a87fcd8269abd0534e51e8f6d3ce905523748e3

    SHA256

    75dfa357b545864d77af1684b5fe1b03bfc176183c613105e0cc39f70b0c7363

    SHA512

    55a4f0aa16dc6f36020f11f152717feea358a54044e542c10e7b150d177b0ba2f3b29f573e6cbe1fbf281f21ce71330dda0a2e220edf5133244566734c31f62e

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    204KB

    MD5

    ed9e5c9df6b167f55cb4953bd22d8c5a

    SHA1

    27d16e42737f4c31fc4087e404aa4a0a90ac0116

    SHA256

    d0d20c46f4e613b91f187166c64e7f6d86cd707bcd1a9848a5d51f83ac1fe682

    SHA512

    1bcfc657721acc1d17d2bdcd4262a6606a5f1a8abbd4dc15501da950be9ef4f5c39448f83daa3b0d8e686541b8050ee2f6a40c1a1e3d978197f00be3f1c6ee07