Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 03:17

General

  • Target

    effb138198caf4b497d1d1f03607a7d70e924ccd1b5af624edc3e0f64e1f53a8.exe

  • Size

    46KB

  • MD5

    7a59f9a3072570d556e65159acc13e99

  • SHA1

    15ef337e01a68aed7881f33d91d4a41b14390185

  • SHA256

    effb138198caf4b497d1d1f03607a7d70e924ccd1b5af624edc3e0f64e1f53a8

  • SHA512

    1ca010570d028023b3dd5501d983ee214808b67c5c01b9ea01b8907951503c09087c91ecbd0895cae1dc1f8511772f060af9431d1d22ed50879836b1606c530c

  • SSDEEP

    384:GBt7Br5xjL9AgA71FbhvuNBN10wpAp/lvolGClvolGwTCus7sczBtRrhBn8xzP+z:W7BlpppARFbhbt7Y7wTCnBbrBTrB1

Score
9/10

Malware Config

Signatures

  • Renames multiple (4062) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\effb138198caf4b497d1d1f03607a7d70e924ccd1b5af624edc3e0f64e1f53a8.exe
    "C:\Users\Admin\AppData\Local\Temp\effb138198caf4b497d1d1f03607a7d70e924ccd1b5af624edc3e0f64e1f53a8.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini.tmp

    Filesize

    46KB

    MD5

    965a21499973fed7e9520f52346a8bc7

    SHA1

    6801ced31d886feec4f5fb30a6b57076b04d2e76

    SHA256

    e3a75ad2d8ecc47a8447bd40cbf9324a4160455ac3f692fac14b0ca58d22f47e

    SHA512

    51cac53b3090192abbc62814250d228f00079d22242ec76920cb300b90cdc912bde458f9b324b58345c6e71016a78546fbdb3c170a194010f7eb63815586fe67

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    55KB

    MD5

    6f9f567821a92ddf8d3fa57f74157d29

    SHA1

    0a29a0666fdbbee31430f4b7ba2b5304d3361908

    SHA256

    ae24f3535779af67e105b2944c38c9c942a553955dc7b9c52c00baba7fa5949d

    SHA512

    e7fe59ae234313fcb38952ea22c9fadd076c3ef60335b41941f5f9861b48df9bf0b3db23849259287c224415c848e68310d3b1c3e7f993928592b9582a9729fd