Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    28-08-2024 18:07

General

  • Target

    005bfa9ad0445307784e7697c5f96feead20750eedcf8539e8a7ca3801ed315d.exe

  • Size

    41KB

  • MD5

    2a1ccf1bae51c4dc37b041c960a1b922

  • SHA1

    866fcfe1e9a57394e453f583b4be237499d7ba50

  • SHA256

    005bfa9ad0445307784e7697c5f96feead20750eedcf8539e8a7ca3801ed315d

  • SHA512

    953dbc4d08edeb36d85d01574407762621766d30d7119d51a62c1b12b327824a98a336a19a9f2823b53e14f72e5c694c2632f77ddd4fe5f1e6e575bf89358ba7

  • SSDEEP

    384:GBt7Br5xjL7lAgA71Fbhvt3a5LZ7x5UR7x5U3:W7Blp9pARFbhaWTW3

Score
9/10

Malware Config

Signatures

  • Renames multiple (3784) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\005bfa9ad0445307784e7697c5f96feead20750eedcf8539e8a7ca3801ed315d.exe
    "C:\Users\Admin\AppData\Local\Temp\005bfa9ad0445307784e7697c5f96feead20750eedcf8539e8a7ca3801ed315d.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2208

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

    Filesize

    41KB

    MD5

    77929eaf854d72c6b4dc32511208e656

    SHA1

    c3405983d41de9ef4dac87a6335a7baa43a54708

    SHA256

    f194ad9791b11d9776417b397a6df1ea2519546f97c82bcd5b5f5f5a8db7f87e

    SHA512

    7be4cfccc0d136656d4d39b35af77db353012416f12e7eb0b65d2f2ed60a3d594afc96459f9c1689c21c40324f414a5fe58aa224ae32c455bf348196de093ad6

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    50KB

    MD5

    a3a73de7841ad312f0170fb48a3b7717

    SHA1

    3286d7d2f117bd70ef2df469d50f6841776ff609

    SHA256

    a1783478f41c776726f6b0c277985f074440c18afc6399a3857e693a42745faf

    SHA512

    581a0c5015900e593a69a8a7545751b5f2b1df5bb4a8fba7b7b676c8b855c82b6ac1209b6453562522301b8f0c040338595eaf2b9cd8ba7f1841f119a65a467e