Analysis

  • max time kernel
    150s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    11/09/2024, 09:05

General

  • Target

    a119ef4aed629886f79361d3752d4ac1c65d1b5adf7985fdd313d7f1ff625f33.exe

  • Size

    82KB

  • MD5

    2a860680b6a1717aaab17175c0e88a90

  • SHA1

    f5bf5f082d16079fc74819820278d97997805beb

  • SHA256

    a119ef4aed629886f79361d3752d4ac1c65d1b5adf7985fdd313d7f1ff625f33

  • SHA512

    171b30f8d74d5da5120e49bcaef9490353b9685e031a5442183ca4a1945a58c8595a8249f8a05936b911675ee758694ac0ae024d15b4dbccf022dfc492d696b4

  • SSDEEP

    768:W7BlpDpARFbhYQkQjjLaMaRRpi1xnRpi1xOYJIJDYJIJMFhWFhCmDpBIjsZORRey:W7ZDpApYbWj2WTWJe+e/qXhg+

Score
9/10

Malware Config

Signatures

  • Renames multiple (3699) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a119ef4aed629886f79361d3752d4ac1c65d1b5adf7985fdd313d7f1ff625f33.exe
    "C:\Users\Admin\AppData\Local\Temp\a119ef4aed629886f79361d3752d4ac1c65d1b5adf7985fdd313d7f1ff625f33.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2656

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

          Filesize

          82KB

          MD5

          452ec4119f947763429547bd4d38576c

          SHA1

          ac8072ce326449c757b6e3ebfb684fc7ad23a3cb

          SHA256

          4c44f0cf6c169d55493e2044346303a080d2fc98a02e3323fd5a5bf2a7c9803e

          SHA512

          344e3935a358e9aca6d8c186b7d96d5e5c3ab0102b97c6a5a866fe74281b0c430b932eac418ba6694ce97e281ac9a60d4091a0abaa5869be60fb0668d172e470

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          91KB

          MD5

          199fb61d7c5ae3131ac81f9ce7d4f7c9

          SHA1

          e4a24ec8712c9b692b9b9d909315ee17cb21c63a

          SHA256

          6677ea3fcab17aeda67612771675c3d5dd5f3578fc5f52f1f78aa8d08b6eee2d

          SHA512

          4f5eb89b6df21bd9a959c78ec3b56e22641b94b4b4c08c942eafc62aade6944de18f1207fe143eb113daeecd06b8e694df36ad029a300010e020b61dcd9fc22b