Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-09-2024 19:39

General

  • Target

    2279a41b5b4dd29bb9afe6d4796d1544608ec2e6c58a8c551ca3fd92a234ef9c.exe

  • Size

    42KB

  • MD5

    1769d9439981587bb5fc5319a01298a8

  • SHA1

    24444d3530ebf1f46d37bf76e8d007f60512186d

  • SHA256

    2279a41b5b4dd29bb9afe6d4796d1544608ec2e6c58a8c551ca3fd92a234ef9c

  • SHA512

    aec97899bdb86b9a5cb0d6f087d0f7816e7949a05a2b5a349f1b1fd44a697de8059caaed60c747033f86cec5b2a6d24a1b5d1fc3c1ba9b1153b0fbbade4e4c47

  • SSDEEP

    384:GBt7Br5xjL9AgA71FbhvuNBNQFrs0AqAJwO1AqAJwOf0VyjVyt:W7BlpppARFbhHFoqAJwBqAJw1VyjVyt

Score
9/10

Malware Config

Signatures

  • Renames multiple (3727) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2279a41b5b4dd29bb9afe6d4796d1544608ec2e6c58a8c551ca3fd92a234ef9c.exe
    "C:\Users\Admin\AppData\Local\Temp\2279a41b5b4dd29bb9afe6d4796d1544608ec2e6c58a8c551ca3fd92a234ef9c.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3533259084-2542256011-65585152-1000\desktop.ini.tmp

    Filesize

    42KB

    MD5

    6f0053712db80cf7e58857c27f2a2b1b

    SHA1

    84bd81cb2a928b5cbe11497484cab80179f1be57

    SHA256

    0e1558ed3f83df5738297022b086a27625ff8cc40949766f2856593243736804

    SHA512

    99c71b966e613ad706c266e04e41ffb28ba9d5feb34187325c8d289b355f3b3107f1dd5febf9d1579a26f0968752dad7a63011e342f588b06853b39b71d71ea9

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    51KB

    MD5

    5caef5505175196399d31685607c8285

    SHA1

    6420cf5ad1f2088cf72946e2ec8aca5475cd3e4e

    SHA256

    c07bbc8fa45509fd3fd870a60f1b2fbca62a185b74dddec562014058120e9df9

    SHA512

    4d11fcde317cba409f5a601d0142cd6cb7f4cf314973fb936f841e22e2467166cc9976700065db961db64bd04fc3ed125c862c60ea8ecc2d44db2502b9204fcb