Analysis

  • max time kernel
    149s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    18/09/2024, 19:04

General

  • Target

    19c47deb1d0cfbc7ad3ad231dedc5fdc0970a46cf87ec6af8180e0c7b0484c35.exe

  • Size

    40KB

  • MD5

    724955a39e02df04729a2e9f7f91a1ea

  • SHA1

    94c0795ef03290aeb0e1d82c8ed2b71b9e724b8d

  • SHA256

    19c47deb1d0cfbc7ad3ad231dedc5fdc0970a46cf87ec6af8180e0c7b0484c35

  • SHA512

    e4425bdd8841196e4f83282c757b687e4846e1bef75beffffb818638d87f204c0bd6baf9113d022491acdc9ab7893528ce7ae2771c42df2654a65b9e2adc35bd

  • SSDEEP

    384:GBt7Br5xjLdbAAgA71FbhvU8g0U0fLMzyKbNzzyKbNWkq3DLXakq3DLXF:W7Blp+pARFbhBgnKLMWK9WKD2N2F

Score
9/10

Malware Config

Signatures

  • Renames multiple (3780) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\19c47deb1d0cfbc7ad3ad231dedc5fdc0970a46cf87ec6af8180e0c7b0484c35.exe
    "C:\Users\Admin\AppData\Local\Temp\19c47deb1d0cfbc7ad3ad231dedc5fdc0970a46cf87ec6af8180e0c7b0484c35.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    40KB

    MD5

    311aea3afcc5ec6d8e84a795c27dbf41

    SHA1

    dd5e11d25cf3c4c5f39df5dc649684b7aadcd55a

    SHA256

    fc4adebffa372c8923cd96996d18af75ed632870e5d69f10f914fe33d7876c41

    SHA512

    66d0d1d66410c4ee074ef2278125b0e001317e245836e3c6e44d7ea91b7c64dd5beab367d6be437a3389f3a4ed17e8b41a4df48fba40fbf46848a67ecb8768d9

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    49KB

    MD5

    4540f142516b08da4f7fc9d5653e8d3e

    SHA1

    58e1964a32b0ec68d15035174845394ecef8cadb

    SHA256

    6de0aef85ec263b1131156136d02040e1779d4ada18535d5126ac2b5ae963f21

    SHA512

    700a8a6e2e675e93fccf42342de21aba06425436c7af490fd59a50ec4473c9ffb20f013ad22737f7e824f7a2a877de3270d2ffb9694b80a269e9c545d8aa19bb