Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-09-2024 01:12

General

  • Target

    a8d1cace4978ea0d85fcb2ba910c8f5c9462ffda1fea59b7e700da0270e68a54.exe

  • Size

    53KB

  • MD5

    1ffeab1f65bc0d8a72f7edb415be1d34

  • SHA1

    b14371bb404e4175a83ef47af3b4ad5c72d2443b

  • SHA256

    a8d1cace4978ea0d85fcb2ba910c8f5c9462ffda1fea59b7e700da0270e68a54

  • SHA512

    e2831c6175da790c17998f7a983135e9183b44a061dda2cb685b56376992da0c591a02c60e28ad1ce9c4a435dd231aa276021a6cac6e191ea0f792e4067153e8

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LOd+QRA88O1ggi1x+88O1ggi1x8:W7ZhA7pApM21LOA1LOTRAsWysWQ

Score
9/10

Malware Config

Signatures

  • Renames multiple (3697) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a8d1cace4978ea0d85fcb2ba910c8f5c9462ffda1fea59b7e700da0270e68a54.exe
    "C:\Users\Admin\AppData\Local\Temp\a8d1cace4978ea0d85fcb2ba910c8f5c9462ffda1fea59b7e700da0270e68a54.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3533259084-2542256011-65585152-1000\desktop.ini.tmp

    Filesize

    54KB

    MD5

    bc10ad8c91ba6603d9bd21f4622429d7

    SHA1

    7e72be4989f6c78037b5e4c0bc1979f1da84f26e

    SHA256

    a1d5c2f654696e0905dd870462ea20791b97f5da2945bcafc66ef4d4260aa770

    SHA512

    2338a6898c2ad43fe02cf6355dd6fa4611c72677f02c3171760f1942b244ab17dc6445b5be74bf39f5d2997e8bc19d44dcac7f79864921902c2ca45a403ec76a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    62KB

    MD5

    04eb24864d298e72139b21bba0ee72d2

    SHA1

    448c5de4642789848ac4c53e898f18b2834a3cc4

    SHA256

    048c8911da9132b2446da3db74d490f9a8a391721b664bf8db909040efa5e71f

    SHA512

    6722b3826728cd945599bdf0440e4cf9c2e4465a0dadb16b991695683c7d491f790267a84b5c6bb15248efa112a701e11d0e68c2bfbd23ae0ab3d6a24f7348c9