Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14/09/2024, 20:05

General

  • Target

    3372dba984e3d12cf325e7ce1f608f3ecf41c3364a70d64a3e52fe19388e903b.exe

  • Size

    36KB

  • MD5

    012ee7633c6c96cc4b36ea5fffa75e98

  • SHA1

    62afbc920ad31f37509a1c2654b10003b27a10a2

  • SHA256

    3372dba984e3d12cf325e7ce1f608f3ecf41c3364a70d64a3e52fe19388e903b

  • SHA512

    7343e7d18b2b2a0242d6f35dd8931b2ca0378de9d1d42889346d23ff182b415ee4bb9ebe3a61ee3f9aff8acb4732b285495256ab1ea51939910e41c3a59ce5c7

  • SSDEEP

    192:pACU3DIY0Br5xjL/EAgAQmP1oynLb22vB7m/FJHo7m/FJHhpqW7U7OlI2v2pdM:yBs7Br5xjL8AgA71FbhvszwU

Score
9/10

Malware Config

Signatures

  • Renames multiple (3733) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3372dba984e3d12cf325e7ce1f608f3ecf41c3364a70d64a3e52fe19388e903b.exe
    "C:\Users\Admin\AppData\Local\Temp\3372dba984e3d12cf325e7ce1f608f3ecf41c3364a70d64a3e52fe19388e903b.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2872745919-2748461613-2989606286-1000\desktop.ini.tmp

    Filesize

    36KB

    MD5

    a26a1304066cbd06f84d737bc215f99b

    SHA1

    e3a17f56f533f4dbf3dd0171ed284a8a3a3c6085

    SHA256

    fa0226bd86397e67db88853768c7f69ac70a41d37c0ac909a998c6a7762df6ce

    SHA512

    7d9f917ddfc9b81d691b89ac76d9357a988d226a968ff6beaa9df91c4f390b3d033e91208cc45c182859154104dc986b047a7e6450265abc14498e618e5fee2b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    45KB

    MD5

    def532fa810c4f333c086461018c7304

    SHA1

    2a816c0c1ee0006a712791668ea1bd58ab6067f8

    SHA256

    340ea31f8d94a13ae6134777db93be110fc25f349d02ba79225f232febac8bcc

    SHA512

    03a81e89576d0eb5fcbd68d74c927e4319ae4b97d5aa3eb5a069059589835d75f9a607832a2458225b0e5b8cd8f6e2894727566a7f9f1bf3300056a222c11cac

  • memory/3024-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3024-70-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB