Analysis

  • max time kernel
    149s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    07-09-2024 12:47

General

  • Target

    Trojan.Danger.ATA_virussign.com_7cb5d2bcca1b93ffb838b01e6ebfe2c7.exe

  • Size

    80KB

  • MD5

    7cb5d2bcca1b93ffb838b01e6ebfe2c7

  • SHA1

    23a6ba5353c1a74bf9b8a8b950e5eac2f2b10b5d

  • SHA256

    e2bcc27f5f74b87663c182103b399baf2dd48f1b33e12b7a10acdeccd83bbbdb

  • SHA512

    c0bcf98bea5a3a699c2bae0d9daf09a784e4b1294419a9fd03a72d4465d1b513e94a22991f62e3eea102b24dc27756d6485882512bac1d6cd0bc38e04a30951f

  • SSDEEP

    768:/7BlpQpARFbhIYJIJDYJIJPfFpsJcFfFpsJcC+3mC+3meDAfABJ6fABJwEXBwzEA:/7ZQpApze+eJfFpsJOfFpsJ5Dk2b2f

Score
9/10

Malware Config

Signatures

  • Renames multiple (2815) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Trojan.Danger.ATA_virussign.com_7cb5d2bcca1b93ffb838b01e6ebfe2c7.exe
    "C:\Users\Admin\AppData\Local\Temp\Trojan.Danger.ATA_virussign.com_7cb5d2bcca1b93ffb838b01e6ebfe2c7.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    80KB

    MD5

    ce1b39125002bd78dfb8e3826da31ee8

    SHA1

    8452c63eb4261c49a9aeda09894eeb63596f0a27

    SHA256

    5d9c83a9fae7ec475d7441df422efc750802c213a65436f4cdf62a83248c0b44

    SHA512

    bc2abe4f90197ecc50488a4d870d056f9da9c610138d8ea7e7a2dc8f64f2b5b131fcfe5dc837d552588f91a9041c5bdb7ad8e02c60850f15606e89fe7dc81273

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    89KB

    MD5

    4140c3d063fa92deae787350e5016d13

    SHA1

    15c720bfe9921f7e6d1bc4815b0f89fe3ac8b87c

    SHA256

    045619d9170cc6c1d12e0508c4a79a8966a70890efd0bbf1414b566204061dad

    SHA512

    1af0bdb4368379b20d9195260e1a7d6ddcc8e6f2d07155196daa7b4d9e29e0a6343dc8b427f2388c6da7b6a216054b55a00020295d3fa572ce45f8b38fb1876a

  • memory/2720-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2720-50-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB