Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15-09-2024 05:14

General

  • Target

    8a57918edf04be84b3d27782cd513380N.exe

  • Size

    69KB

  • MD5

    8a57918edf04be84b3d27782cd513380

  • SHA1

    4cee33a582b25ec6d65b2a1f6f15fcc0f3c75100

  • SHA256

    fd71bbd2ef3e491a0712c1a2b2a867b1d2459911eb72a0ecfbd70659d1cf34b9

  • SHA512

    f5b2e021d4c4f099bf674691928ca6f7a9cac59fbaea78c985aa9893250201ae41167fc61cc9132973c0dee8d06b4436f361d27948e294c56b09bf99a2ca7cd8

  • SSDEEP

    1536:W7ZppApwEwnmJARJAaXxXNJdkCKPuJdkCKPKWZ:6pWpUnDXxX6

Score
9/10

Malware Config

Signatures

  • Renames multiple (3194) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8a57918edf04be84b3d27782cd513380N.exe
    "C:\Users\Admin\AppData\Local\Temp\8a57918edf04be84b3d27782cd513380N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3063565911-2056067323-3330884624-1000\desktop.ini.tmp

    Filesize

    69KB

    MD5

    d75aaea6ce85c2bec174040779aceabb

    SHA1

    ec8553322eecf89b964dfbb1c1a14030e001449f

    SHA256

    3f92babaf2633837c38d0751950b35e9f07f4009fd978f58f1c533c994d9d909

    SHA512

    bfa6d514c3baa1f13f103e5a8f33a4ac8f5cb7581c52d8205b56181702755ad075019ecd953c891b114618918dfa2e2ebffc6cf0d94c7e547f4fe8781cf190a7

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    78KB

    MD5

    a7f2a8045a8a841db05d38e1d84ad5e3

    SHA1

    cebb0e1e7c308e1b6baf6cf77705b26081337fab

    SHA256

    5773faf851f36fce35f9e4f076fd097f8a35137255b5ae1adc4b5f4ef3ba37bc

    SHA512

    52ada0f1cf01db501bff25c1ac5463ad7e344fa556adaea7502aa14da85398a26cd78e5e9d97cdd67306bc3e23b4101ce363a82d95595c628b92eae6d30529a2