Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2024, 20:17

General

  • Target

    2818d867da7b05d2df9a7d13c365606e01253ada40b092e53fef6d16e0ce4c62.exe

  • Size

    50KB

  • MD5

    79353554f425b8f4901f9aea7008b714

  • SHA1

    e3b9991b2fe9a6054654d295fa07371dfb23e14a

  • SHA256

    2818d867da7b05d2df9a7d13c365606e01253ada40b092e53fef6d16e0ce4c62

  • SHA512

    d861d5582df14ffd5276da1e9593f612be4006faa0eb29d5c632d47b0cd9ab9046fe8b461616958664f590cebf700ed18724a0b9a50cd895ed483389d320c916

  • SSDEEP

    768:/7BlpQpARFbhn54fmiy+3BVr54fmiy+3BV6nM6G:/7ZQpApmi6ns

Score
9/10

Malware Config

Signatures

  • Renames multiple (3758) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2818d867da7b05d2df9a7d13c365606e01253ada40b092e53fef6d16e0ce4c62.exe
    "C:\Users\Admin\AppData\Local\Temp\2818d867da7b05d2df9a7d13c365606e01253ada40b092e53fef6d16e0ce4c62.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    50KB

    MD5

    49f6ce7c666659d4d17a10fd882c7e55

    SHA1

    9f4874a69b4ccf953a2cd9098dd5e636461bb1d5

    SHA256

    e4670eb10589b1e6421182a0519f22961ff93ce3fa49f474bb130288ac0bace6

    SHA512

    99717b03cc524fa5ed2ea5ffad575279c4a638f1ed6d04e28d5b528d32d39baadb5555035b716ec7d31a03ef507ac0be8d529020cb313a3621bc077b42804fae

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    59KB

    MD5

    9af7212ad46ce1c31248557486688bba

    SHA1

    6260d27a98f617e31e50cd12cd02810d15be1a96

    SHA256

    11a0da36c03ef89db3430deddd20e353a37e7874c8636c80b67a41ac85e7cc47

    SHA512

    62dc2a98d8be13dd117715b7aba18cfd6e627366567862e9d88e34598ac30450542d0422fd7a86d82e579228ff2586327311fddc3a172e2842e2544f52a0b270

  • memory/1712-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1712-74-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB