Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 18:42

General

  • Target

    156025bd1b43d963955f4f38a4c72d82692a82fd3a1d8a3ac7673563d94d4300.exe

  • Size

    50KB

  • MD5

    4e2b6c7cdc7905d26748c7f2b447e069

  • SHA1

    b0745f331262c347c373ebbf880de38545b02c17

  • SHA256

    156025bd1b43d963955f4f38a4c72d82692a82fd3a1d8a3ac7673563d94d4300

  • SHA512

    6f38afa56ae170fa492066204e3c4da9d50fc1e7ee7e2cb4ad46eca583b1fa6b36b9b3d24837d2e2a9d987b8484a51e9cda9862392b7da43559685af0d98038b

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfpRo+fOiJbfo+fOiJbCk8t8QP2Hbww9ySqbw4:W7ZppApBULcfpHLcfp/ZeLP27wHw4

Score
9/10

Malware Config

Signatures

  • Renames multiple (3561) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\156025bd1b43d963955f4f38a4c72d82692a82fd3a1d8a3ac7673563d94d4300.exe
    "C:\Users\Admin\AppData\Local\Temp\156025bd1b43d963955f4f38a4c72d82692a82fd3a1d8a3ac7673563d94d4300.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-312935884-697965778-3955649944-1000\desktop.ini.tmp

    Filesize

    50KB

    MD5

    7a101c1375b42c35693b3947da4af3a7

    SHA1

    edda822f9e22a151a95d3a032d8d1a3b3088e571

    SHA256

    28673e2eba593056ddd2bc5ff931067e794f6e8a3890e7811283e7a57d46450f

    SHA512

    7296fcec82149e831d12596aea43371fbe9f86923183eec5f311b22d0bd7fd8a119b5f7d3d80e47c01320fcb19d3ef423d4d3ab5c019e3480eac74d002947b38

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    59KB

    MD5

    e7672d4279b90e8b9f4cc3118d0f8066

    SHA1

    1af60e09fd7d9ade17f541d6961f46fe50ec238f

    SHA256

    c47265a012fd8bdb77329e64db4ed23e5dc34da12d75e7fc62a31ec0f67d5e33

    SHA512

    56bf263141868c70be487d8e16bf2c52c4c0a88634fa3a96ee0dd387f67106f035e724fce571739929798aed995db90197eb798c55f6e7109ee59556cb4e774c