Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 22:30

General

  • Target

    63227dfb3e2825031541fec929efe5a723940d730c813bdc0e57260bcf9b24b3.exe

  • Size

    39KB

  • MD5

    1159b06a6b71baf28020618c64562615

  • SHA1

    9f1accfe706c84fd3e15509b5be75e380325cd19

  • SHA256

    63227dfb3e2825031541fec929efe5a723940d730c813bdc0e57260bcf9b24b3

  • SHA512

    9ac2bb457ce1685558600a692d809f965f901a0c97c26d4537f407284c57a83bf478f5c8f601f2f22e0f89e83540ad69ee820299c440f2c4f2ed459ae3c679bf

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42Lcfpb2N231F1hi/:W7ZppApBULcfpHLcfpSo3fbi/

Score
9/10

Malware Config

Signatures

  • Renames multiple (3748) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\63227dfb3e2825031541fec929efe5a723940d730c813bdc0e57260bcf9b24b3.exe
    "C:\Users\Admin\AppData\Local\Temp\63227dfb3e2825031541fec929efe5a723940d730c813bdc0e57260bcf9b24b3.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1924

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2257386474-3982792636-3902186748-1000\desktop.ini.tmp

    Filesize

    40KB

    MD5

    8b255c8643c97113d3ca1811e30cc9f3

    SHA1

    dc755080bbc72b662067d25b5aa92d7547a017ca

    SHA256

    2f32013bc06e03b6a23a7dc4a2407201398b7eba96d05099acb1094ead5f945d

    SHA512

    ec292d6c25844894f21066cbe3e8632056959b9b13cfd040a407bd05e5d8eff27962f06f18e4016980068516317891d990e6924b4c491ae3afbedb9f9ad992a8

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    48KB

    MD5

    c6947fc9eed136b421711911cfc0aef4

    SHA1

    84bb7a280330d1a999877e532b606fa1b0ca055d

    SHA256

    d5e2e28c64ba1f4b0a86272484f192854568a7efa92b1ec4abaac9f134deef0e

    SHA512

    3b2b825bc6e0b1772acdbec4d60bf781dd63bc94f0e31a0c9f8dab978f7d882535375af2938728c4a433cfba5b7e81409ca6fe9404757eafeb69bc7205db5505