Analysis

  • max time kernel
    150s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2024, 01:24

General

  • Target

    ac3a4c7dba7c772a9710f9fa332a3f4e6d7059119da438ec29371b57f6812fb7.exe

  • Size

    57KB

  • MD5

    f56b3801f75adfbd0cdd720ee1dbb887

  • SHA1

    fb09f5432e79b56390bba8b50bdf9c67b45b86d6

  • SHA256

    ac3a4c7dba7c772a9710f9fa332a3f4e6d7059119da438ec29371b57f6812fb7

  • SHA512

    3019a75426be584abc3589dd99335911d6312d3da157ce8d0ad020ee0a2514a64fede8aa0c2e88841baccf9fd150f662a433591163fbb739e3a90c90121c0c58

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfproFNFkTfq9Tfq7h6hB1ix:W7ZppApBULcfpHLcfpyDc2ih6hB1ix

Score
9/10

Malware Config

Signatures

  • Renames multiple (3477) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac3a4c7dba7c772a9710f9fa332a3f4e6d7059119da438ec29371b57f6812fb7.exe
    "C:\Users\Admin\AppData\Local\Temp\ac3a4c7dba7c772a9710f9fa332a3f4e6d7059119da438ec29371b57f6812fb7.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1464

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

          Filesize

          57KB

          MD5

          1f866939e704f9ec08eda98cd4530cd1

          SHA1

          8865f44ceed543275e0bd118c1b5e215a5619aab

          SHA256

          0367c1879e6b9760fbd7243bbde5e07f5e1f7adc591a289b13568ee9eb998080

          SHA512

          f86e73caa642ecf20a3d4b3ee2cb9bd0c50cfdb8e6a1634bd4577dfad69a7ccbcbe231afba1636dc502447790bb8f5928e8c26bfe533577568bc36c31b4c452d

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          66KB

          MD5

          d4d3f3ae261be7ff4e30ee843bbde23e

          SHA1

          cd08116b0bd2277cbf8cedadf7461ea27db2410d

          SHA256

          f3ea00d1499efaaefc2dddeae78c041dcbbe618b0b5dfb675e61fbfa109bab4b

          SHA512

          b99c1c0380be5ef70cc8243f72a26fa921d25d54f0a8dba5f2b0ed79ac4f536bf851a84da6e1dceb1b63fcf6e9bc0ec43645a1db354e24de892e656db1fb2fd3