Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18/09/2024, 19:06

General

  • Target

    1aa19d68df0847dc5bef9b67162b27ce0c288303ed2c729ab9d25cf9cbab3dfe.exe

  • Size

    43KB

  • MD5

    0144df4fcc9f10633c713be754e02414

  • SHA1

    66f2298e63248c702c2d46cb97abcb522e6716ae

  • SHA256

    1aa19d68df0847dc5bef9b67162b27ce0c288303ed2c729ab9d25cf9cbab3dfe

  • SHA512

    0011e8b34ba2961c99c881fe57f573b164de2de3eb3adc0c9e1ee2a338eb467ce4fe18a90679d5d3e0c4dae8ca66cbcf9262b58fe55d6c30cf2d21b74ce98f67

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfproFNFZlwHkDpNi1xPwHkDpNi1xA:W7ZppApBULcfpHLcfpyDZlwOgrwOgs

Score
9/10

Malware Config

Signatures

  • Renames multiple (3779) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1aa19d68df0847dc5bef9b67162b27ce0c288303ed2c729ab9d25cf9cbab3dfe.exe
    "C:\Users\Admin\AppData\Local\Temp\1aa19d68df0847dc5bef9b67162b27ce0c288303ed2c729ab9d25cf9cbab3dfe.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    44KB

    MD5

    20326cb8dc96abe623e13ccb9bd31f36

    SHA1

    05cffdf80e2094249b92bf9797bc63fca72f872e

    SHA256

    dc69ad7ea9f2a76c337917f8b8d2903f3e83528480a893335b662a85d2bdf00c

    SHA512

    eaae40aae24813752a007ad34e2f4f1f04d12083dcf91dab2aa03a1d3b9cc8a8f1a6913d467cd770463e09a52caefb03366e7b80fba78fe1f1167eed17859af8

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    52KB

    MD5

    c9c0c0967260d14fb9909fd2a24ccf29

    SHA1

    7f7588aa121caea1d409d00268cfef26f4aa959d

    SHA256

    02b9f71d7f98d5952fa6e82491e60157b2c532c0d87f471df6f44bd6dec3cb1a

    SHA512

    d8cf5e92b96ea684267421642993d64d2ab4575487be057791aa17700abfa8bc2480d5cfb249d11c21014a02023a4c5d8587fcc3a4e746717a0fd78cba8eb7bc