Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2024, 04:31

General

  • Target

    e8f9dce639dd694f68c726f9b8f70619184c50fe695efd0db3259b6727b0c249.exe

  • Size

    89KB

  • MD5

    64260b5e03c480490407e87345c86f41

  • SHA1

    57df911e2718f4c9581a2597c988ecb09e8ee72c

  • SHA256

    e8f9dce639dd694f68c726f9b8f70619184c50fe695efd0db3259b6727b0c249

  • SHA512

    dd1694eba616d622701d97acca2fb0ea924a3af28d28715753d4ce3576b6767d819a7a7b29b309f6d04068f896718c31fb345294c6cf75bedb2b8032c484407d

  • SSDEEP

    1536:W7ZppApUFpEhLfyBtPf50FWkFpPDze/qFsxEhLfyBtPf50FWkFpPDze/qFsAcEhu:6pWpUFpEhLfyBtPf50FWkFpPDze/qFsT

Score
9/10

Malware Config

Signatures

  • Renames multiple (3535) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e8f9dce639dd694f68c726f9b8f70619184c50fe695efd0db3259b6727b0c249.exe
    "C:\Users\Admin\AppData\Local\Temp\e8f9dce639dd694f68c726f9b8f70619184c50fe695efd0db3259b6727b0c249.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1960

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

          Filesize

          90KB

          MD5

          e8fcbc7477197d3f6f0db1e89abd57b3

          SHA1

          3a5572570d24d1d6cf82194eaa45cf1faf26ae0e

          SHA256

          682a7f454b32d39cbb84fbacd910ac71aa4357afa6d1a276ded51bcb62eb4971

          SHA512

          d082378c1f09884496a74c280e8464fd7566735d058bdfe39a854884a420a463f3ab2817e37cf5abaf3d978acb989b6be3e05b55232ca159491df64997ad67ae

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          99KB

          MD5

          5a086bfbc1c06df73639de47def76c0e

          SHA1

          dc37b114385d900ca33be26d4a322cb581b27b47

          SHA256

          1f175b8b51c112173dd6a06ccc6f76709a14ec72a7ee8816d7ef370ccab8de17

          SHA512

          21898520142f8e345d2dd4f486c61a994ace1ea17ce604443deb394ef6df3135e04d5c3b9c1b19535b1d9eb29f8d32e246c60d82e8f0cd25ef42ab624b8785ee