Analysis

  • max time kernel
    150s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    08-09-2024 03:37

General

  • Target

    9a49a9b0e634031dde83e3a0ce184ef86e4aa6c5017d21aa16d36b59430b3407.exe

  • Size

    49KB

  • MD5

    d4b688ad1dc3e63223e9982beea304af

  • SHA1

    9cdb0f7ad71f027418503b3f25fb70c6dbe9020b

  • SHA256

    9a49a9b0e634031dde83e3a0ce184ef86e4aa6c5017d21aa16d36b59430b3407

  • SHA512

    34f130b3ebf72308812a296fdcfe548bd3d78b17777bab903b615e9179d230b5af2331dbdd74331458ee63a96dcc30d11a0319cdf5506b8166a4772607ec1783

  • SSDEEP

    384:GBt7Br5xjL9AgA71Fbhv7bhvo42L5FgAytBVRz:W7BlpppARFbhjbhg42LcfT

Score
9/10

Malware Config

Signatures

  • Renames multiple (3754) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9a49a9b0e634031dde83e3a0ce184ef86e4aa6c5017d21aa16d36b59430b3407.exe
    "C:\Users\Admin\AppData\Local\Temp\9a49a9b0e634031dde83e3a0ce184ef86e4aa6c5017d21aa16d36b59430b3407.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    49KB

    MD5

    9115ea3f801a9a19657265326df8f631

    SHA1

    37ec591f0bdd8be1a9a49cc98e86939432e26c74

    SHA256

    15de3cebb43cbc8b2c5b795ffbc8f83b7c8ea274f4dffd9fabcd8711447420b3

    SHA512

    8e3e017b86df6e59d32b0073714cfde46bfda705b392ad7301bbbb046d9df50e4dc072d4fe449ea774a869c8863a9bc1a6727a89f66fc4242bade6119ac8605c

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    58KB

    MD5

    791e43b3be2edb339f5d59a38c8b6cb6

    SHA1

    e0279fd58b60117934df986a42d3e4239d911f4b

    SHA256

    eb8a25f7e2ffe0481291244de4e3e6e57a51135cc3eeb854ae85755c9b391dd1

    SHA512

    ef3c4c6b5d46bd3c942b0cf40d800a7022034288eea407bdae3adec08a619c57ddbcc2141081b7d93aa9d26c269417cc0b3834d5772b8a2d25d50226509429b8