Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 20:43

General

  • Target

    4601be11ea0f94d1a6c663c5bd8b5e0fa27299457f18d2f518f938a7d736aac9.exe

  • Size

    47KB

  • MD5

    e4b7240daa6e7bbaf1b3eb7e672bcc2a

  • SHA1

    3de42b3c6a9b93ef427191112f978693aa17b0bd

  • SHA256

    4601be11ea0f94d1a6c663c5bd8b5e0fa27299457f18d2f518f938a7d736aac9

  • SHA512

    c6d88eec836ffb11b7d108aacc4c0cc90d8976db869a1187f0bf59b0e6a04e592d08dab6af0b13bb015bb8d951fa8dc91231cba2606961b504174487c174edef

  • SSDEEP

    384:GBt7Br5xjLvassAgA71FbhvgqHqMjL4jLS/3MMf/3MMy0U0czyKbNzzyKbN4w:W7Blp2sspARFbh5YSfffynfWK9WKh

Score
9/10

Malware Config

Signatures

  • Renames multiple (3742) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4601be11ea0f94d1a6c663c5bd8b5e0fa27299457f18d2f518f938a7d736aac9.exe
    "C:\Users\Admin\AppData\Local\Temp\4601be11ea0f94d1a6c663c5bd8b5e0fa27299457f18d2f518f938a7d736aac9.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2980

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    47KB

    MD5

    849797dd9a093cd0d5eca20842737cc4

    SHA1

    018ecdf563401fcdda9776d899479961cb27067d

    SHA256

    4e02883a9bd0cf2685f8248fc272f74da5178b3638f1cf64b40221e006b41535

    SHA512

    41c5c84b04485422fe8bd2d1a6e88b0bd20fbb2e27068d0b58b06c398c201e179ba0e1a2a551025aaa5b59cae0d5f6c4fbd0ab39de04a6257de7387b35b7dd31

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    56KB

    MD5

    824173f7948c350952d716180f176896

    SHA1

    1adf96729c4a4e4d0a8f01a20f2f1f04d2c12565

    SHA256

    8ea37100f4076563334f22bfa3f647389e8069def77cf8a24f72ddb691d669b7

    SHA512

    4be8145e3014af31caafbce8b0809f41eadbceb772203de2e527f1774d99dace5ee65c09c6f7e534659c851df4f89a49554a1e8d8ace8cbe1a4cc227370c2c1f