Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-10-2024 01:08

General

  • Target

    9bae641995d628dcec30b1d22502309e1df24b4867459bccdfbe536f417cfac9.exe

  • Size

    57KB

  • MD5

    3dc8ad641068a174b45b33b803c037eb

  • SHA1

    b0c49e113152586ba6b2659edd57e1360fb5b6f7

  • SHA256

    9bae641995d628dcec30b1d22502309e1df24b4867459bccdfbe536f417cfac9

  • SHA512

    0fc8f928db6010350eeced8e526900b4b708f6043d5877a3df8103f157edb32129042e0b4fbb6bca614b98aa9819710ab534d688168a44a8ff6202fa20ef57ee

  • SSDEEP

    384:yBs7Br5xjL8AgA71Fbhv/Fzzwz72Jwuq2JwuR0U0Iap3gyaHq9nwK8gvgyaHq9nX:/7BlpQpARFbhNIiJwsJwwnZap9QKQr/A

Score
9/10

Malware Config

Signatures

  • Renames multiple (3743) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9bae641995d628dcec30b1d22502309e1df24b4867459bccdfbe536f417cfac9.exe
    "C:\Users\Admin\AppData\Local\Temp\9bae641995d628dcec30b1d22502309e1df24b4867459bccdfbe536f417cfac9.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4177215427-74451935-3209572229-1000\desktop.ini.tmp

    Filesize

    57KB

    MD5

    d8ba431dd38825a915c5967e8e1a3e5e

    SHA1

    2819042db8f6348b51c1af06f9f5aec86f71e70e

    SHA256

    46d14b62e86e8d6e296a21a004ff3055feb735dd995fdf31eb9b31a31fb5af35

    SHA512

    36e13afc0433209b1419d862c1fc746935191e21248583738313759692804c294854d76504f1021ac41cde3005b811e7b357e8ca1635f025c4408229c7635944

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    66KB

    MD5

    23397f9cad28f7e4d9061807954e9a36

    SHA1

    cf85a17d767c9862b0008c53aefcd297be239f31

    SHA256

    8120d590b3b2a5605393027199c5a015f16fc90ca4dbfad0c5d6b176eda426aa

    SHA512

    77cbe5e32cc9c9cae431b83542013693f42f48f66460d76626c82e4f40f020bdd2aaa44c269a78fdb87d529cf471386fbcc407bd25ebddb021142f3170168921

  • memory/1724-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1724-74-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB