Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    28/08/2024, 21:46

General

  • Target

    4ae1b05a51fe96faa63c9019dd2e00cf829cdefb5a148f6c1b5f3a145a7b9e61.exe

  • Size

    72KB

  • MD5

    95e6b831d62952e010ed4bc93cf3e9ee

  • SHA1

    f03aeb366a4446a123b504f5fa833f1986628987

  • SHA256

    4ae1b05a51fe96faa63c9019dd2e00cf829cdefb5a148f6c1b5f3a145a7b9e61

  • SHA512

    391a3c986482fbd0a306b63783b4823f89b907efd2bd641b863c8b24037edf282136f5d10552f9c5a793f236682dbafda48a90c25184e7fd699844404d0279d2

  • SSDEEP

    384:yBs7Br5xjL8AgA71FbhvJUfWGUfpa4ma4LGXnlGXnlYzoPT:/7BlpQpARFbhiWbWYqYzo7

Score
9/10

Malware Config

Signatures

  • Renames multiple (3667) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ae1b05a51fe96faa63c9019dd2e00cf829cdefb5a148f6c1b5f3a145a7b9e61.exe
    "C:\Users\Admin\AppData\Local\Temp\4ae1b05a51fe96faa63c9019dd2e00cf829cdefb5a148f6c1b5f3a145a7b9e61.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1672

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

    Filesize

    72KB

    MD5

    2834b39c4621fca2c0c93b0049e585cc

    SHA1

    b59bae1ac45b4dcd3a910dc3a9ea1241a284f922

    SHA256

    1b82046d1a0aba496086e7f01ef1ff71a617e90f0b96ffa5b157002a2d12f0e0

    SHA512

    b355a8f3ecd73349bf30b3902e5750a63fb1747102c23d75f6e8dce7fd573386d2cbc5f15efc31da4dd84559682120132d87290e5f2907787267797ed495518a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    81KB

    MD5

    88713375e0a88091ec9602f13bf575a9

    SHA1

    f717207f1511b474aa356870c797814360bf6672

    SHA256

    9eb6b93a3375720624da0286242e071d9bd10570d70dda6cf3f4ba5357f16146

    SHA512

    f783d29d873ae0d0b67f03f76454b76afada1fd22170e1c40ca604b3e6ce1ec842c06561c852852fb9d415d4e09b3374adc4d6b13788cae98b63af8d4f96c789

  • memory/1672-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1672-68-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB