Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/10/2024, 19:46

General

  • Target

    317ae2fb378814de3c4ba5ac32a3143de34dfdbca43a95cc77ddb41646a45c84.exe

  • Size

    51KB

  • MD5

    6c9e8cbcbd9f9302f597fe0cc10a05e8

  • SHA1

    bfe52a05dd8af0c74fa412b0170adc3b917a852d

  • SHA256

    317ae2fb378814de3c4ba5ac32a3143de34dfdbca43a95cc77ddb41646a45c84

  • SHA512

    6fd3836af2c3988583f3ccd69325ca03e737d764a86ad3c691397417235593219f124056ea12e7f70f3fc7498984553d934482463726e40474c2c0f2c5055887

  • SSDEEP

    768:W7Blp2sspARFbh5YSfff9n1oXKCqzEIn1oXKCqzE1IwScIwSWF/MF/y:W7Z2sspAp5YSfffMrfr92a

Score
9/10

Malware Config

Signatures

  • Renames multiple (3759) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\317ae2fb378814de3c4ba5ac32a3143de34dfdbca43a95cc77ddb41646a45c84.exe
    "C:\Users\Admin\AppData\Local\Temp\317ae2fb378814de3c4ba5ac32a3143de34dfdbca43a95cc77ddb41646a45c84.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3048

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-4177215427-74451935-3209572229-1000\desktop.ini.tmp

          Filesize

          51KB

          MD5

          4790b348f47bf39cce3368b81689fb14

          SHA1

          4b756c65363aac9ad728c82b41e7c6fe080f7b7a

          SHA256

          46dc6ed4a4bee38cfacf3a5441c928c0ff0d5d94c694563264f50ebcc8dba7ea

          SHA512

          089ae88cc3f4b6ac53f3845e5de4e4d3a67435d1b13aa3de5188f488eeb0effb923988efac0db6f4505908d11d62fb928f2b2718d9d8899a9fd40d771f8aeca6

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          60KB

          MD5

          e71abfc4a33109c86d2726d40acad5a8

          SHA1

          2d20f732daef1e2a29692094829103bb16cae798

          SHA256

          8090d82fe2ead8c148a520ad67c537c5d74d6d9429aab5922a0e9e2b896a1e01

          SHA512

          f6e0dda0b27ff6193bcec787a02548de2c34c50f9faa597995d81ab967629e7d551bd75a6c152182ea26e595d5f9a94eb152bd9d39a83d4b10d92253767deb18