Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    15/09/2024, 01:53

General

  • Target

    d385a05d224abecb2b497b8e0fa40449700237cda89875088e4d8313208ebd22.exe

  • Size

    35KB

  • MD5

    6a3a82502379f59bc9c3272cab75832c

  • SHA1

    699e316a0428478dae805456d5d25a4b56c45926

  • SHA256

    d385a05d224abecb2b497b8e0fa40449700237cda89875088e4d8313208ebd22

  • SHA512

    b7d85d9f6b5b0e64ca04924e7e7ae5b4644e577e7bd78c6dac92049f03fec46239f2ad8851de3d0ab1c1291e54d02c1e78a5ef43e68fb58a92fdee23ff7a487e

  • SSDEEP

    192:pACU3DIY0Br5xjL/EAgAQmP1oynLb22vB7m/FJHo7m/FJHhpqW7U7OlI2v2xNJPp:yBs7Br5xjL8AgA71FbhvszwRPZ

Score
9/10

Malware Config

Signatures

  • Renames multiple (3792) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d385a05d224abecb2b497b8e0fa40449700237cda89875088e4d8313208ebd22.exe
    "C:\Users\Admin\AppData\Local\Temp\d385a05d224abecb2b497b8e0fa40449700237cda89875088e4d8313208ebd22.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    36KB

    MD5

    3554badbc8d67bf39be9179adcedbbc2

    SHA1

    febafbd3e5f9dbb5cbf76914b7aa6e74a574ad99

    SHA256

    88a7f9b23449122227b3644e3adc6ec2c56764d40a71141dc943afe357420fd9

    SHA512

    c723e8f7c469c4ce7b929bdb81bb81ae277dcf1bed7ac8ed54a2277f333633ea9745c430213456f04bffd6c74bccbcdf290c36c2fd2147791df51f769891b0eb

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    44KB

    MD5

    5b5abc78a300235cba8cc315a6232f96

    SHA1

    fcceafc90fb655845641975707404fda597737f4

    SHA256

    a943209f85ed4f5b9cbecb1bb43026ce5c2d3d29e1e2ac01265fb36b718cf192

    SHA512

    f97dc82cfaf1259f9a63e08b2511b58c595228845e07600e3170df0a2cd0fe820a15faf922306943e4c85f3c7d36d49b0299f98198d8e9b5f0a5035d59ec49b4

  • memory/1904-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1904-68-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB