Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18-08-2024 20:51

General

  • Target

    4934363132e4f1abac8ca82f4fe8b4efeb9161ab5a7c3d66372c7e123ae3a68b.exe

  • Size

    58KB

  • MD5

    6d5f347b5e0b76827a8a8778be9f1074

  • SHA1

    ba0a7c1aeeb57ef1244b5b165969f02a69bed937

  • SHA256

    4934363132e4f1abac8ca82f4fe8b4efeb9161ab5a7c3d66372c7e123ae3a68b

  • SHA512

    d5195370519a5805f11bc5c7338711a5a8aec390c05ded8199ba5d5f8274825c799bdadc269961b3663adc476377af97850b96b4f2bbdca704e8755de2e1265a

  • SSDEEP

    768:/7BlpQpARFbhn54fmiy+3BVr54fmiy+3BV6nE101IK8WKnFIMK8WKnFIo:/7ZQpApmi6nuKNKnF3KNKnFp

Score
9/10

Malware Config

Signatures

  • Renames multiple (3754) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4934363132e4f1abac8ca82f4fe8b4efeb9161ab5a7c3d66372c7e123ae3a68b.exe
    "C:\Users\Admin\AppData\Local\Temp\4934363132e4f1abac8ca82f4fe8b4efeb9161ab5a7c3d66372c7e123ae3a68b.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    58KB

    MD5

    d8b7b742fffce80f1c4f51fb28c97f66

    SHA1

    2c6c2b55037c28f33c7cd706662f52381326b381

    SHA256

    b67bd7dded62426d454aea853dd86763e3658ac0a8fa9d26bc8c246f25550d8e

    SHA512

    879378e1978be81d6ce9cb4801b63759b57f623c7d9494afaca2ef9286972e733cabcf533ec086823cdfe749390b3f5649c0080173f283335867a393496a2fc9

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    67KB

    MD5

    5a8b054cfa75c5ae170ecbbd1ac61796

    SHA1

    255480e0b853129aa499e6bce56f3dc8b809b6c7

    SHA256

    f846c9a6042dae21ac9678f06f2a02311b86105ba0a559b4c8a53637bfddf45d

    SHA512

    f873fe1ef27320ddb0562f6d991263794dbc3b53217d01b0bd89ae0628ec956dac7f98890f7df41b401bf4128330acb837d0a11605e507cb9684f20470df4a73

  • memory/2988-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2988-74-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB