Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    14/09/2024, 19:19

General

  • Target

    1deb4ae9669a78ee5a4044e05a3ecff123b092976fb0fc8f728bd88be9c48dc4.exe

  • Size

    99KB

  • MD5

    0724447830ba2fc33fefeda8c7710821

  • SHA1

    8b86c7dc68b2e63daa917064ade85e419caea259

  • SHA256

    1deb4ae9669a78ee5a4044e05a3ecff123b092976fb0fc8f728bd88be9c48dc4

  • SHA512

    ddd2a289a4fc56d90cbb0e050339305868bacdaec05af9c5b719a29bd0a9655f771fed254f563ccd310f8ce5256b90b6faf9f95249ec96068e2e85b3070d4d34

  • SSDEEP

    1536:W7ZrpApojOPG0PGQJwFJwkpe+eTDPfFpsJOfFpsJCAdCjHKPFn5+:6rWpcOPxPke+e3fFpsJOfFpsJbgEy

Score
9/10

Malware Config

Signatures

  • Renames multiple (3457) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1deb4ae9669a78ee5a4044e05a3ecff123b092976fb0fc8f728bd88be9c48dc4.exe
    "C:\Users\Admin\AppData\Local\Temp\1deb4ae9669a78ee5a4044e05a3ecff123b092976fb0fc8f728bd88be9c48dc4.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2152

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    100KB

    MD5

    e297bb7b33db3d045481833b65d6fad3

    SHA1

    124d1ad4c2252dd24adf9e9227ab50ca5311b91f

    SHA256

    83504871c0520879fd30c24cbd9ef2a4062714679c5437cc04a6053200f852dc

    SHA512

    ca6ce23fac9856c56dc402e279b49c96ca344d0804d9478aaa3e4833989e489e0804548dc07f20c0ab13ce6bff2c5fbe535a698c1f5aef0bbb7a5532c37fde9a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    109KB

    MD5

    eeaa7372705efdd5afcc7f3172671672

    SHA1

    63b3e04715136a98a84a2762d07e809affa153fd

    SHA256

    8f4f4465f320cb39e451fe352cde29ac33700ecfe5ad3732b22f651638c70b3d

    SHA512

    03a00ac7affd6f897224e203ec674af771d3fee3b0eedd1e6eb2a953f3eccfb0362bdb0652b722f79ba43876957c491f2f338318b200438510d883692e5864ce