Analysis

  • max time kernel
    120s
  • max time network
    21s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    05/08/2024, 21:26

General

  • Target

    0b42360c7d28dbe14a2df92bf0ac0f10N.exe

  • Size

    68KB

  • MD5

    0b42360c7d28dbe14a2df92bf0ac0f10

  • SHA1

    e628715d0bbd98309a1aa4d36b9f7890e199915c

  • SHA256

    b8ef13a9b3bccc13a0184f7b9e4847941b48f8020b260202e25a1da62847d9d4

  • SHA512

    8655ef29ba082d7d48413af648bcfd13e6cabadb60db057591d63e72e9626d1b8e85febea3578ce8f319417dcf71c0d47a8f6bed15d974bc3783f51649d70e2d

  • SSDEEP

    1536:W7ZhA7pApMNcH6gW4Wvs9s2cic8GhGvn8:6e7WpMNcK9vG1WJ

Score
9/10

Malware Config

Signatures

  • Renames multiple (3091) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b42360c7d28dbe14a2df92bf0ac0f10N.exe
    "C:\Users\Admin\AppData\Local\Temp\0b42360c7d28dbe14a2df92bf0ac0f10N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1940

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

          Filesize

          68KB

          MD5

          470cbf229294c69f156099e5a8829e68

          SHA1

          dfa6e5efd569c1006963df72a9b02e4255c12e9c

          SHA256

          0abdc0739e1883a28c86f1b4456d8fd238c449a422afde49d736ca1a7ae14518

          SHA512

          18048e92cba7c703a087bd1621007df929544da2811c6599a7381107629908b228b1852d5a782924ac75d149f9a703c7f6b486b966adee7fbca5f25ff4b346b9

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          77KB

          MD5

          4fad601f249ea04d55c453dd96e6fe18

          SHA1

          eb290bebeb4a0bc608ba79fe7ff7578ba394e878

          SHA256

          3b748c55cfd8552f869176fb049c612439bbaafa9362c36fa9bf1485aa68cc86

          SHA512

          cf8c684d6fdf4767e780b8881a3ffc1e89ea7617a4403119c4d6d18f078bba33c48f2d07a2b78c24d446a63dcf2ccc5c4ead03260160867ae8df52dbb0bd018e