Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2024, 01:11

General

  • Target

    c00efbd3bba8161e962e82f2d092b7c0d162a3e9f843bbfb39ac7604f9ae3c39.exe

  • Size

    34KB

  • MD5

    a6095cd532302b78463bc6cfb09cd1cd

  • SHA1

    80a47f1b04358a34232a1c92fcfae3b632528a0e

  • SHA256

    c00efbd3bba8161e962e82f2d092b7c0d162a3e9f843bbfb39ac7604f9ae3c39

  • SHA512

    1bf575b9c3b18a5c6933b1e325d1df4d1853c16bf6e7f9676291d13a80641b42e38c64d3755918369faee545eab01e2214db4df3957d0fd239e084363ad87cb4

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LOl6Sl5ltKV06:W7ZhA7pApM21LOA1LOl6AKW6

Score
9/10

Malware Config

Signatures

  • Renames multiple (3793) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c00efbd3bba8161e962e82f2d092b7c0d162a3e9f843bbfb39ac7604f9ae3c39.exe
    "C:\Users\Admin\AppData\Local\Temp\c00efbd3bba8161e962e82f2d092b7c0d162a3e9f843bbfb39ac7604f9ae3c39.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2972

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

          Filesize

          34KB

          MD5

          a5c83cccd51daa87442f5587ff3ab769

          SHA1

          9296d3f97560e8d1a5cbd75a8ac1ab4a3d67abaa

          SHA256

          785c502cf229ee2f6dfc2340c8640b1e12c0d1a2ba410ef05a6604ba289f84a2

          SHA512

          c562ad03aebad5195c8e36014157d7d753d84ac4733217ce874755bb08fdaa5d4faa3ffa621cfcdb22da30907fdeb24351f0136faf5ceb6eea46ca537a0d3e98

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          43KB

          MD5

          95ea1c3e79344e4c46f696494037f90f

          SHA1

          979bd0b4e35b27056b50617d80f916f22d945e89

          SHA256

          f1b2bcb8a764854108d9b364aa7ade6e9c35c7061318c9638fd5ecd1dc8621da

          SHA512

          67c62b9a41c3b0e47858d0176391aabcc6e7356fc91c555224ef38913e458079b07f27676bfc611e488e406f909211dd9662824ded30ad1c56ae14db61d8a4f6