Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 02:21

General

  • Target

    d569bb6688e64e437b86c26ed7f78929f5c741facc07b39b17a181f2614c61dd.exe

  • Size

    55KB

  • MD5

    d57c2d7cc542405417ed3cf03c8e9e2a

  • SHA1

    9f0bebb92cc42f788a9e643fce13f3d03f4cb110

  • SHA256

    d569bb6688e64e437b86c26ed7f78929f5c741facc07b39b17a181f2614c61dd

  • SHA512

    314effcc65809d323468c6d4a897c5a0ee2dc37ab53217d494473ec0575fc955bc167777330f2fa8938534c7644bf9c007e506f179680586b81c7dce085add77

  • SSDEEP

    1536:W7ZrpApojswv0EhLfyBtPf50FWkFpPDze/qFsxEhLfyBtPf50FWkFpPDze/qFsl:6rWpcsHEhLfyBtPf50FWkFpPDze/qFsr

Score
9/10

Malware Config

Signatures

  • Renames multiple (3986) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d569bb6688e64e437b86c26ed7f78929f5c741facc07b39b17a181f2614c61dd.exe
    "C:\Users\Admin\AppData\Local\Temp\d569bb6688e64e437b86c26ed7f78929f5c741facc07b39b17a181f2614c61dd.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2196

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1846800975-3917212583-2893086201-1000\desktop.ini.tmp

    Filesize

    56KB

    MD5

    63b4e30ea81732614cd69c5cc30573f1

    SHA1

    c1af4356750603197c46303c3dbbcb7d437c4090

    SHA256

    ef030633be9f38be71e19a1ff5fdf1fef9ca4cf90180fdb71a40dbf461f5b86d

    SHA512

    42bd1ab13fea259719cdd9af9b5792675c7535de6ef54da7b34d61c2131d77ac4e88e5240c645e5f7d277759aea988367dec03d93b5f63696ea826b957ea9a56

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    65KB

    MD5

    65b376ec9d505da5d9fd04f9c0233561

    SHA1

    4d414f63f22ac1673f32bf4e4f95c0a0042f164c

    SHA256

    3c65d8bec07defeb757e678369822bed62ff478b815794f0379cfd4b4d851c44

    SHA512

    0e80f428b210e9fe8cabe15d3932181f09ec2b4c926860247043ef35d3184f3b8074afba3ab1d51daa6bd341a6c94540a4a80e2236cf992b4b2008a69440f3a8