Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 00:20

General

  • Target

    99236ab9d9dfaa3de3e62d44982755dda44986f5f74c6bedafff31d47ffcde35.exe

  • Size

    90KB

  • MD5

    1e791a0a8d76b2994e82a140596a050a

  • SHA1

    ad06ed4fec9e6166f0b4d94caaccb7ee6b728d68

  • SHA256

    99236ab9d9dfaa3de3e62d44982755dda44986f5f74c6bedafff31d47ffcde35

  • SHA512

    a24b19597c51a3c01348b299c5e73bb6d1e135306a1c07b15b89ff8959ea8170f4d3579247974f834fd35fd910e1d84b992e9e95d2522c4bd5991c137441ba05

  • SSDEEP

    1536:W7ZhA7pApH9QHwtRF9ESWu0SWutlggalggyaRjvmujvmRzqzlmJgwmJg/SvqBSp:6e7WpHIyRF9ESWu0SWuDm841qi

Score
9/10

Malware Config

Signatures

  • Renames multiple (3522) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\99236ab9d9dfaa3de3e62d44982755dda44986f5f74c6bedafff31d47ffcde35.exe
    "C:\Users\Admin\AppData\Local\Temp\99236ab9d9dfaa3de3e62d44982755dda44986f5f74c6bedafff31d47ffcde35.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2872745919-2748461613-2989606286-1000\desktop.ini.tmp

    Filesize

    90KB

    MD5

    f6c968fa75db5d5f14daa4cdef8c8682

    SHA1

    3e57c4f432fa59c1c380a06a015b241b94bd7359

    SHA256

    f3e63dbb92f32eff4c4fcc7444eb349a57319b3cc37004f39fcdd800105e5401

    SHA512

    4a00ac07bb95fbd7f1c3fca0335dbf8b667d29c2209732d5faabd6047342b5cdaf3153d5a89ac79dedbc9cb8d89971dadb943808485df77b86c32e86b2de6a75

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    99KB

    MD5

    0f3772a9d039eb98adc98bbca57e79f2

    SHA1

    1e7a480835d9f0af1baaf23bdd4895c76b8ba0ba

    SHA256

    81662962059aaa7382f73337bd5212d4f710fcd9cfa5aafb04810b725da72c27

    SHA512

    b733d017801eb84d1909d0001c46e06e69ee9e2a9a805df467a3980fb627dde2643b54696b342b7e760093f53c6ea3413e6a7d710e606346323308d87e63dee8