Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/09/2024, 02:03

General

  • Target

    462e88f708671b04dc8d3eadc785779fc46f02c52d9a6f98ed02d3eacaf2cf20.exe

  • Size

    47KB

  • MD5

    ef76ea4f46278d42b6f4ecdc58b56a8b

  • SHA1

    9be3a367b185635d647af326979bc3f6b2fda184

  • SHA256

    462e88f708671b04dc8d3eadc785779fc46f02c52d9a6f98ed02d3eacaf2cf20

  • SHA512

    43558e5ef035ec06fcc4842b3405149988f7d1b8fb71e2221197c796480c35f242842721406bbff6dab1725507432ec8d7c714a70771e2399683cd6c9212ca8d

  • SSDEEP

    768:/7BlpQpARFbh1WK9WKzN1J3DCl4N1J3DClk:/7ZQpApQKIKz

Score
9/10

Malware Config

Signatures

  • Renames multiple (3841) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\462e88f708671b04dc8d3eadc785779fc46f02c52d9a6f98ed02d3eacaf2cf20.exe
    "C:\Users\Admin\AppData\Local\Temp\462e88f708671b04dc8d3eadc785779fc46f02c52d9a6f98ed02d3eacaf2cf20.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2444

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3063565911-2056067323-3330884624-1000\desktop.ini.tmp

    Filesize

    48KB

    MD5

    5d5eae3d965efa50da977257d8a3c9f4

    SHA1

    79458b902d56220dd7fc03a6ed2a441ab1342409

    SHA256

    cb4f975c38b3f148d827c5d13b1c08a13d5a93f51151439ae2a32dabcc7e3c0f

    SHA512

    26200a535ddb7d6fea42e710360a6bfdda970483606b21e50a8bd16a61a9b3572609f36bf282805165e06cf81efb084fa67800e246eb214fc0cabf741afc1452

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    56KB

    MD5

    524bafe675761f9d88324af62f4eced0

    SHA1

    db3fc0eebdc947bf764baf7f209d1878e17311aa

    SHA256

    3f9572a3223566c474448d03eafca761f84202e3f4556c3f3429efd39f5bf05f

    SHA512

    867e9f53e8284308fc9252601a247ac00a0a49d93839b18c281bbde569871733f3af36d66e5c563694e1212e2e11fd7ab30891f0a6136747cd87d1ae78f725bf

  • memory/2444-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2444-70-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB