Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25-08-2024 03:08

General

  • Target

    a60c62938a1d1eaa3cc60ae4e4629eeb48d777779785dbb1ff163e0558438fc6.exe

  • Size

    49KB

  • MD5

    bbdce0e46269dbe1e20955a1926ede39

  • SHA1

    3fe00d53ff81516e5de17760e713992273ba500b

  • SHA256

    a60c62938a1d1eaa3cc60ae4e4629eeb48d777779785dbb1ff163e0558438fc6

  • SHA512

    e4bfd4db8aa0010662fa0ca1bb36719c6329196d46da89f2b94bdf2e5ddcbf26f0501692b6319455af3995ab26922fb7409cb558f765673609ecbf1a30517498

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LORWAnWAkpUE5c5gSuBjjyH:W7ZhA7pApM21LOA1LOrtkpt6g/yH

Score
9/10

Malware Config

Signatures

  • Renames multiple (3785) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a60c62938a1d1eaa3cc60ae4e4629eeb48d777779785dbb1ff163e0558438fc6.exe
    "C:\Users\Admin\AppData\Local\Temp\a60c62938a1d1eaa3cc60ae4e4629eeb48d777779785dbb1ff163e0558438fc6.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini.tmp

    Filesize

    49KB

    MD5

    9aeed8b0fb70c1dafe87fa1249fc9e6c

    SHA1

    3c00b8cc59aba2ad9f271b74c65df57470f68c48

    SHA256

    0f0b9a20cc61c3771fa551731cae17aa8e489300cf6bcdb72e738168291342a9

    SHA512

    12accfa78c5ef2b29aac2314b98f1d7cb62b55662943a75749a3545e4b44cb8f18403e0fc27e3b98cfc9f1d1fb546193ea1f9dd5973160d70435698d83d5c484

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    58KB

    MD5

    513dd931757a1eb17257b561619cace1

    SHA1

    555352efff2c7aae113da2a60f4d090a961e0343

    SHA256

    635001db841a50fc8c1e26d4190117adf32561b09f028f7f06db041725e31a7f

    SHA512

    5ee2267d4740f4e88b9cdb6feee7faf64ea65c5f2c2df5d306c6de6ac9d7c1dd7a3af5b126d17c047109c90598572b683fef08b7b9ee7c8a110ed8b0aa8c6331