Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 19:01

General

  • Target

    0323301edef3500d60740e5f4527772a1eda1da93b92c7afb90f80e8dff17b9d.exe

  • Size

    47KB

  • MD5

    3dd58bc863d0b6db5dc1f0a93c3c5a4c

  • SHA1

    1e8c7682a1e771fdf56f3d30ab3c9cb267663a01

  • SHA256

    0323301edef3500d60740e5f4527772a1eda1da93b92c7afb90f80e8dff17b9d

  • SHA512

    b91b8653d20409edc708643f05355e2d8d7a28df7680d94009e02f3b78ed072573aee613d02c58a9b351f3e2d279676cdb115796d62d66a736b2913fca3be8d4

  • SSDEEP

    768:W7BlpppARFbhbt7Y7wTCnB2ELEW0fZfZ/2:W7ZppApgz

Score
9/10

Malware Config

Signatures

  • Renames multiple (3682) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0323301edef3500d60740e5f4527772a1eda1da93b92c7afb90f80e8dff17b9d.exe
    "C:\Users\Admin\AppData\Local\Temp\0323301edef3500d60740e5f4527772a1eda1da93b92c7afb90f80e8dff17b9d.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1208

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

    Filesize

    48KB

    MD5

    b0e290dbd4cee12d6db03a9519d1d14c

    SHA1

    6139de0d2239667bb193183909de9d2103f4f433

    SHA256

    6f61a88e776b9b62d9769ed7a2a2b036778a001ae543fae76163b520ba1c4b23

    SHA512

    a6d35d200cff2cc23a0ff7f1a97312c78dd5d29ba481dab24f9683649b8c935b6c24bdf3f44d62f211a8d02e61b10cff4411a09d4b601a3be16c764494b66be1

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    57KB

    MD5

    2286b2969e1117ce14c867fa2f8d2afd

    SHA1

    e749786d502bd74096bce1050aa2d4df87b9fd0d

    SHA256

    9a9e476a6ce25158d25dfef5c4e0c7436395f0c3cc4d293154ade077ca495520

    SHA512

    f6d06d19281a81a5757552369e3d4d422970bc992fb8885db16bf62d5d823ca2e892bc6f6547f97f1c90d115f3a8372f4f530add925074d972365e5e5c3dcc39