Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29-09-2024 00:02

General

  • Target

    86a83558c0f210bd4bd48e78442eeba365f273b2647c3091649789d230c60f35.exe

  • Size

    53KB

  • MD5

    a879adb87a144e47b87b46f7f63c7a0f

  • SHA1

    10b86286aa2fbf1d7af3a27264a7aaaf81f62393

  • SHA256

    86a83558c0f210bd4bd48e78442eeba365f273b2647c3091649789d230c60f35

  • SHA512

    5d4fd3b8b4420237d882219171b58ee46176f12fdb4a675063363629836bcfae55b68a2d734997abda71faf8ba4666af335713d99d56bfea967882128e909aee

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42Lcfpb2N231F1itvtTJLJk:W7ZppApBULcfpHLcfpSo3fstvtTJLJk

Score
9/10

Malware Config

Signatures

  • Renames multiple (3731) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\86a83558c0f210bd4bd48e78442eeba365f273b2647c3091649789d230c60f35.exe
    "C:\Users\Admin\AppData\Local\Temp\86a83558c0f210bd4bd48e78442eeba365f273b2647c3091649789d230c60f35.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4177215427-74451935-3209572229-1000\desktop.ini.tmp

    Filesize

    53KB

    MD5

    4272f90474d1349bd1df987f54f2b7e8

    SHA1

    c8f59d11943d35b2da4f7d47adea05e0cec4a3c7

    SHA256

    ed7b9fa14f8162d0fa99ade1f3fc39289f8edaa93ca370937697c6590cdc9271

    SHA512

    6e5cb979a2ee821c33ddf2079ad930bb14fffbfbb5ec5955c08fec70f7e878d04750903f35627ff510a89df9d71aa49d35c2ecac1b264193d1f99c57f2a5c7fc

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    62KB

    MD5

    198a983d4660e83f31f0637213d1f397

    SHA1

    75e8042558bb86a74bcd0f1c9d7560f82fc07120

    SHA256

    d3ece0e163fecb13004de5a044a500f06c5dc69d91a1537f1f1cde4ad50aa80a

    SHA512

    f2579990194865a5071e479b4f85fdd557c1881ddb0ba822783771f243a401cdcb193e734faff79dd81578204b8ebb679015bbc37fbd91a5b5c2d8dea710367a