Analysis

  • max time kernel
    149s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/09/2024, 01:33

General

  • Target

    abcdbf29205f09254dcfe0e412e1cf586f81a79e4fe61a58dbd12d77b999ac90.exe

  • Size

    55KB

  • MD5

    29d622424fa4b730b8ff41875d70d76c

  • SHA1

    437aae37d5a8d4526cbc671b2667f2c868834151

  • SHA256

    abcdbf29205f09254dcfe0e412e1cf586f81a79e4fe61a58dbd12d77b999ac90

  • SHA512

    b4c468a4926a427dcdc9f78524bb695de43a9d54977708ed856e8f804b4ea8231d8f464790dd1610b16407b4aeb54a94ca6a2653664d0ebf3eb61c286fc8dc9f

  • SSDEEP

    384:GBt7Br5xjL9AgA71FbhvuNBNKVkVYlIAItCCIntkntV/eazc5azccpp:W7BlpppARFbhFAxC7ntkntV/fo4ocpp

Score
9/10

Malware Config

Signatures

  • Renames multiple (3709) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\abcdbf29205f09254dcfe0e412e1cf586f81a79e4fe61a58dbd12d77b999ac90.exe
    "C:\Users\Admin\AppData\Local\Temp\abcdbf29205f09254dcfe0e412e1cf586f81a79e4fe61a58dbd12d77b999ac90.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4177215427-74451935-3209572229-1000\desktop.ini.tmp

    Filesize

    55KB

    MD5

    a1152962a4e06ce69c1876936f26e913

    SHA1

    fb7008619bff44246fe8844ba3892e9d125d73a5

    SHA256

    9906ed77a973ee9cbb486fe6b0e84ed21360b250ed7156652e2ebadce2ae930a

    SHA512

    1984b51831fbffeb2fcfce1f3ee4dc8a8df6aa576f6bf5b4fe20f886141d7da18b4f0b66b0e54c7305896f5fa1abfe40f3ab120ca42417ffb35dcd80cfa01dc9

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    64KB

    MD5

    cc1f79a5dc6f469056cc0452b5589119

    SHA1

    1c711808af0e34719129a5516d9daeda8c2c3e9b

    SHA256

    cd114b8be4ed0f4b229c9532c881e2e638eb297442ae70c9ccf9864175d630e2

    SHA512

    9f1a7174d31d77493fdd3c1869bf2651145cf5b81e408859f773b00d9ee1ef91b38398608890e6f18f4a3a4396d0b5715ccf841257af598192c8b694e1c88abf