Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2024 18:06

General

  • Target

    00834e34f8f478be8b760a9d2bdb1cded018a2f6bb52f36f72c66794604af8ee.exe

  • Size

    120KB

  • MD5

    36784d4cd4cebed0c7d6111ef3e5bd89

  • SHA1

    202fd73821af937c93880aad451670ee0f1b16ba

  • SHA256

    00834e34f8f478be8b760a9d2bdb1cded018a2f6bb52f36f72c66794604af8ee

  • SHA512

    9d5a0b6abb1971a616dfcaf12cc404380378105ecc6e72200261a8861393bb7f812ab04fa75af6bc34da5cdfbed3c24b72d4682869363d9e5a1a7dec04abdfc5

  • SSDEEP

    3072:6e76BtEkoIAkeF0RNyreZ8PRmqIZq9awE0ctUiQF2vUHFe+0AkyyDfEmU0RFWn:Re/EU2

Score
9/10

Malware Config

Signatures

  • Renames multiple (3436) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\00834e34f8f478be8b760a9d2bdb1cded018a2f6bb52f36f72c66794604af8ee.exe
    "C:\Users\Admin\AppData\Local\Temp\00834e34f8f478be8b760a9d2bdb1cded018a2f6bb52f36f72c66794604af8ee.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1846800975-3917212583-2893086201-1000\desktop.ini.tmp

    Filesize

    120KB

    MD5

    efcfa09539e6e347433892d910b3c508

    SHA1

    c57c4b5bc7431b8ff9c0d7da7d0203fd1003df42

    SHA256

    5ca7653633f68eb244988f593e6235217653a0a3851fb6af0942b6eb404becdf

    SHA512

    681a9aa193e8dbbd3ccb8b3188ff0113286c4243b5899872492da074336ea8a2ccceff10aa2675d843ce776160e5f2cd3273d0d45c12d3b03942e2aa383c3470

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    129KB

    MD5

    df26039bf5c4f6cc0737669636daf8cb

    SHA1

    97679298312f938964d810c52ac5bf24db8ce6d5

    SHA256

    5de5fe1d40b6b61bf8f3f9aec67ccfa78baa346c182cf361ca3af52ab7cb74a0

    SHA512

    5d56be0b0689f00c142ba3866f9bbee59b6511fb1b15e6788c407944673da48a1d247e5ef8af6de0835a5de039a0e87bb88d41ca369c230b15ad1a7e1540a797