Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26-08-2024 03:23

General

  • Target

    ce791d5a24f08ad32ebd8a315dfe7fe0672472a2233827c437874a21e0a7663c.exe

  • Size

    51KB

  • MD5

    2bc90ee16f31be953f23b1ff26b8345b

  • SHA1

    dfd3dcd1c7f9830b251819952bc5d581439a1acf

  • SHA256

    ce791d5a24f08ad32ebd8a315dfe7fe0672472a2233827c437874a21e0a7663c

  • SHA512

    36fd4ebfdf0d9f7dfdb5e75d44e41f895c75b9115d901de2038b8f835b3b91ceb87ac75766440cd9d26680aa60d58a1d58c9e63f2c4e7431f802bc7363e702f0

  • SSDEEP

    768:W7BlpppARFbhbt7Y7wTCg0hcM0hc0C76QC76BwB:W7ZppApN0hcM0hc026Q26BwB

Score
9/10

Malware Config

Signatures

  • Renames multiple (3757) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce791d5a24f08ad32ebd8a315dfe7fe0672472a2233827c437874a21e0a7663c.exe
    "C:\Users\Admin\AppData\Local\Temp\ce791d5a24f08ad32ebd8a315dfe7fe0672472a2233827c437874a21e0a7663c.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    52KB

    MD5

    2237e84c876c156b7da05f810a606864

    SHA1

    75684b204f1906a267e5671317604505cb27337f

    SHA256

    47bd1afd7572fe983ca567b2dd2dbd2948f37df13a52cf633e2391ffc694a740

    SHA512

    7c4353c1afed753ba3388c83818d6f71c3bf7820802684a8c862caa3a65dff4bf8aa42570fb3009ce6dbb1149f9b320d6dab30a5a0f31f7afb378efc1954c2c5

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    61KB

    MD5

    8d83f02f1a8ead4a2cb3eb75594685d0

    SHA1

    424f7bbe75ad37fdac52cb64e41fd88035d1e838

    SHA256

    f2222a025e3e9176a7265922965312f3ac159a74efcd0d76e449acc36d13fa94

    SHA512

    718d3a798af49ac102ac213ddc53f189cb837f8f846a57a1e536aa9d2a1ee415666d392a3e02a6d94481f8135fe86f88932f94923a3c50fb2010df0f4b58883d