Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 21:09

General

  • Target

    522e30f93c172d2d4eddbcea4d2d6f3070f01c508465ef67d110204fc64634c7.exe

  • Size

    76KB

  • MD5

    8ccd501b0bcda9d47bc20f3f50d7f0ce

  • SHA1

    4597c83b29ee194e8b290bfa6310cb812db51358

  • SHA256

    522e30f93c172d2d4eddbcea4d2d6f3070f01c508465ef67d110204fc64634c7

  • SHA512

    e919d13c34c42396495803403ec0ef3f329557de8cf6917c0b6f9e462037baa7f566e7faa753fd623453a594f9527584e3fd5637e3daaef71265fea1bf8f89df

  • SSDEEP

    768:W7BlphA7pARFbhvOsTKnKqtb4HBZjlwGpCYnigugqOzM9bdifwMtxEwJjlVki/mN:W7ZhA7pApvOsOKM4HBhaGwOQ54xEIjlQ

Score
9/10

Malware Config

Signatures

  • Renames multiple (3507) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\522e30f93c172d2d4eddbcea4d2d6f3070f01c508465ef67d110204fc64634c7.exe
    "C:\Users\Admin\AppData\Local\Temp\522e30f93c172d2d4eddbcea4d2d6f3070f01c508465ef67d110204fc64634c7.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2292

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

          Filesize

          76KB

          MD5

          59de31b928a98fbcc542892fe568237a

          SHA1

          03f6d497ba55ae484cac64f746b023ab10ea213c

          SHA256

          2160b2dd65b553ce7f6fd028181396828d7e4edfc8ec26b7afa4ecac6e5bd957

          SHA512

          7f482a1cde544fd30babce4a94600dc8114a8342cad1244e22b0676de642ff61208c58e9893d2449cf01cd3f2fd06b9ef5117460f9f353fdfef3896d2a210279

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          85KB

          MD5

          2bdbde13168961b5bb9b278d055720ee

          SHA1

          69d18bac8a69022f07ebd95eea15081eb79074d7

          SHA256

          7d661c747db62b792b6b2941b4f9db322ef85161e9d3a64ef7212fb65ec020ff

          SHA512

          2374c2b0588c92c4cf5dd96c137101fded5915dca748191451511a6fb306a89c5e04cf547e2605eb3fea14d9507ac822c2da88cd783052258a5c2729dc9c36ba