Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 04:30

General

  • Target

    d58c4da894cd25b8285ce39a23373619180fa689432cc08929d0275735aafba6.exe

  • Size

    74KB

  • MD5

    97c176677e6ea91a2059d4649f25b4e6

  • SHA1

    955c4669f3e6f0d9480e895b779bda8097824b2b

  • SHA256

    d58c4da894cd25b8285ce39a23373619180fa689432cc08929d0275735aafba6

  • SHA512

    ede3c288c629a1525442dee2ae78e3f143be25e6b0505e13516a65a3056108d7d5e7c1b0d5842d3a46f9891f063fd2941d14e4e90bc14a5efb985dfedad53917

  • SSDEEP

    1536:/7ZQpApze+eJfFpsJOfFpsJ5DlYpyxFIyxFP:9QWpze+eJfFpsJOfFpsJ5DlYMFfFP

Score
9/10

Malware Config

Signatures

  • Renames multiple (3521) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d58c4da894cd25b8285ce39a23373619180fa689432cc08929d0275735aafba6.exe
    "C:\Users\Admin\AppData\Local\Temp\d58c4da894cd25b8285ce39a23373619180fa689432cc08929d0275735aafba6.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2816

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3290804112-2823094203-3137964600-1000\desktop.ini.tmp

          Filesize

          75KB

          MD5

          59ffb5bb409e826daaf681362c42fd75

          SHA1

          d661e6e4e3c106f1d97105e8b3c2ce3f35947baf

          SHA256

          216c5429cc0d9e3bda64c6f63fa9da516ed05db3ac570f8f4bd451636d487a85

          SHA512

          9fe01f56635c3adf2b6f04b0076e0aceca09b6ebf988b55ff534801e3c8d16f17fecce13216e2204801c2a268e0c8631b12adfbf9afdbbd80748e0b2ff0b79a8

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          84KB

          MD5

          0a077c03b2ba1d634c89e66eca7ab40b

          SHA1

          c7a1fb666f0b984b2e85e771edceb88657d482fc

          SHA256

          2c389864c1de8e1af7ea463c45117d5cb112cac507ce796d985c3a089b16852c

          SHA512

          2f367ad19814d8a59c9ae520e7020ca4e3fe1192b5cdf9307ed839a7299e5a534de50863a244ff5326af38ba318bca20dc3cdd5a2e90d18d94fed2e98adcc42f

        • memory/2816-0-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/2816-72-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB