Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    28/09/2024, 21:48

General

  • Target

    53420fc18cb3b9b6e15f15022d00bb72c9ec721a881d02fb19519a39567b09de.exe

  • Size

    55KB

  • MD5

    5208b8545339740f195e2016f48aaa76

  • SHA1

    514ab4a023d660c2a0d6739924c112ee93c64cc1

  • SHA256

    53420fc18cb3b9b6e15f15022d00bb72c9ec721a881d02fb19519a39567b09de

  • SHA512

    de023ef4039c67c083d5da3b4565a61469882a8d5d253626c2603a4095f2f4ac18090b7ab2e63d135154940d464c4096111121018064e7183cc0652b37b7bf08

  • SSDEEP

    768:W7Blp2sspARFbh5YSfffynfWK9WKWQFLeoVERZLeoVERBo5fOiJu6OiJfo5fOiJZ:W7Z2sspAp5YSfffyneKIKWQyWmePeu

Score
9/10

Malware Config

Signatures

  • Renames multiple (3681) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\53420fc18cb3b9b6e15f15022d00bb72c9ec721a881d02fb19519a39567b09de.exe
    "C:\Users\Admin\AppData\Local\Temp\53420fc18cb3b9b6e15f15022d00bb72c9ec721a881d02fb19519a39567b09de.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2384

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    56KB

    MD5

    c8b8953e0ebdac06cf811f5110b66254

    SHA1

    8d781cbc1492723bc90e6e22f224e57c28984e17

    SHA256

    9e2ba9832a880cf07938f4176fb7407726b7a1fdc5241ab72275f2f8bbd1bdef

    SHA512

    3695071762f9f53687b758eafe3df7945443621a03da072bbfa7eda0950c426a0b2e8847c34c31cb8dbb1be5e877cd3cf3fabaf3e4e2647ede344a735b6832e3

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    65KB

    MD5

    cd6bac84e6bc4c5a481dd8fb750da8f9

    SHA1

    86b14dac9e1576433adf79def13dfe3923860dd4

    SHA256

    bae6cae37ebeeada605b9841ca2f7258b5ef8a574054793d3c4b02b8bb7a2750

    SHA512

    9dded74d532ea82b93175143540e7ebb7d6472634aed5b5cac3f39460869f68d8cf594508f455b1931fa117628d43b4c6ce19921e5deec2fb13c9d3475ce858b