Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2024, 23:32

General

  • Target

    70cfc84dd493a1af9e726dbe1e0a5c7c7d36434a7305e3fc85f717314dba99ad.exe

  • Size

    88KB

  • MD5

    866c0b874be65b3872974a90aae609ed

  • SHA1

    a39c8505bec3ad8e017f8866085129855288857b

  • SHA256

    70cfc84dd493a1af9e726dbe1e0a5c7c7d36434a7305e3fc85f717314dba99ad

  • SHA512

    1fe25187dd3370ab7b9c2441de19c34b71e54feec1d30add396c1573aa293af01fc86d362fa5537696988718ec0c981936d34d8e35fa28266d01cc40c4777561

  • SSDEEP

    1536:W7ZhA7dAZ1++PJHJXA/OsIZfzc3/Q8asUsJOLKc/xJtLJtTGLtEreRRNRRUQY:6e76mQSohsUsUKDtEreRrR+QY

Score
9/10

Malware Config

Signatures

  • Renames multiple (3499) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\70cfc84dd493a1af9e726dbe1e0a5c7c7d36434a7305e3fc85f717314dba99ad.exe
    "C:\Users\Admin\AppData\Local\Temp\70cfc84dd493a1af9e726dbe1e0a5c7c7d36434a7305e3fc85f717314dba99ad.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2200

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    89KB

    MD5

    e843dcfe955d063257b42fd9577661fe

    SHA1

    1e806fdeae88afa65a4447116f56cbf6d379a268

    SHA256

    f0f88d9d3d1bfc1bf1f9b94eff534c4b36ece03554386044d225c2f57130a393

    SHA512

    dd26966f87ceee89e7c68c27b6455650d83678b576c4fcf2afb9e3f904df84d395bb2584399bad4b533640ef18b75aa502cc89d846f2ef9485926091dd621ff4

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    98KB

    MD5

    9feddd59788a5c8c7637de3d4145b34b

    SHA1

    dc1bb52dd49e59b722f799a7a0295e4bbe250625

    SHA256

    d02f8ef7a5dc4a105ccb4d87d222c13ef4c404f0b19f0c2a87914dc00eaff509

    SHA512

    b8605ba11eb3322166aaad0f9a052ac6d0d835287ff974bacfb60886cae672baa1a94154375f95c6162b848e656d3eb3c8f7982d715f44d046a0b5443e5f0a7f