Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/09/2024, 21:06

General

  • Target

    487b89d7af4e29ea8194ca07b3faba37112eab5470b57b4f47025a21a112b94a.exe

  • Size

    77KB

  • MD5

    081a7f68e03924414fcc342afa2c8366

  • SHA1

    effddc4854d58a03ad31c1ad2f035befb50d2d18

  • SHA256

    487b89d7af4e29ea8194ca07b3faba37112eab5470b57b4f47025a21a112b94a

  • SHA512

    d131db4e73152e48152d86a8344db26f2c6fa72aa0527fa241ead858c1bd7ebb62896da90f954f1c53c5e35246242031716a0bbc05ac3be06cc46719b2d5e59a

  • SSDEEP

    768:W7BlphA7pARFbhvOsTKnKqtb4HBZjlwGpCYnigugqOzM9bdifwMtxEwJjlVk0:W7ZhA7pApvOsOKM4HBhaGwOQ54xEIjlv

Score
9/10

Malware Config

Signatures

  • Renames multiple (3460) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\487b89d7af4e29ea8194ca07b3faba37112eab5470b57b4f47025a21a112b94a.exe
    "C:\Users\Admin\AppData\Local\Temp\487b89d7af4e29ea8194ca07b3faba37112eab5470b57b4f47025a21a112b94a.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3533259084-2542256011-65585152-1000\desktop.ini.tmp

    Filesize

    77KB

    MD5

    f3fccf8530744a1717a2af9dc0c5354f

    SHA1

    683b8ac6a96855c4b4ba28e0495013756e772bcb

    SHA256

    970d50ad1a31a054f4ac4dfbaec2f0ce92d85a427f9dd14e55732e3a1124f2aa

    SHA512

    c9dde5927bb9dea198fa8552cdd53960a4b76cf91d3618e89efc337212a0d0bbc3f01b55e320407dbe16417ff5dcddae52003c6fe0b8bb61da73dd5334b7780e

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    86KB

    MD5

    a0d525f885c113ab768e12388a13f635

    SHA1

    f9050e13c0b79d320a3c63bad76861e4916f3ba8

    SHA256

    075566573ebe311cdfe950615d9561fd83290b91057706040cd8595dcf6e23ff

    SHA512

    565bbbc2910b543d91d9d00c2c82cc2894889bc7459c358af6a7cbac085173d5b0db13e09b30837fe3aef27dcc82a989c9e683eb4c401114e222f30f3d0b5752