Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 00:28

General

  • Target

    9d6584e311e396469fb465b23edbca8cc1d22d9cc9719378d3a2effbf80fc822.exe

  • Size

    41KB

  • MD5

    0bb1359b59d6ff7982fcdc58b5d2f740

  • SHA1

    045128fbe07fb501ab7af78aac9259a05ab9b26a

  • SHA256

    9d6584e311e396469fb465b23edbca8cc1d22d9cc9719378d3a2effbf80fc822

  • SHA512

    dcbbd1ff37f06ba7be845742d82b58b1d23973587fbee43f8b9d3e756330b72d7fb84de34ffe6ace08c805158b4b893890b9b75c9f9abed5fd4d07daf2e1c9a4

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LOl6Sl5lsS2VOG:W7ZhA7pApM21LOA1LOl6vSPG

Score
9/10

Malware Config

Signatures

  • Renames multiple (3820) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d6584e311e396469fb465b23edbca8cc1d22d9cc9719378d3a2effbf80fc822.exe
    "C:\Users\Admin\AppData\Local\Temp\9d6584e311e396469fb465b23edbca8cc1d22d9cc9719378d3a2effbf80fc822.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2072

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3290804112-2823094203-3137964600-1000\desktop.ini.tmp

    Filesize

    41KB

    MD5

    6cc0f9ba50ad720ede5e3d2a7ab1de16

    SHA1

    816e992b8c151561cddb31e1ed3cb9cd293f0a99

    SHA256

    4d45bd2049da17d1d99d898c98d2c1ae530b434685d4b74393009b42cdc9894a

    SHA512

    776050586822b9aa0cbf553461cbb6b1ed978ddebd511f02832d12895d051205c8d55e77acaa3bc7edc7a6022fabe1b6fc0b76518fc052d2ab43c255bc317855

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    50KB

    MD5

    243b973f44ccb2854b6614e2e31d2088

    SHA1

    d4616da7a6324886fae23cca6feafef989992ff1

    SHA256

    aae62d4501ab64c3a076238b5063d034e1440f802a08b28e9265c570f248ee7e

    SHA512

    c6328a9358ff962f28ae5993586b67e50f97c8b0195824f0c579485452b6573f78a012bd017cd4a90ab137ed6c474deec209f88c6490c369b32adf7a4eb2fe0d