Analysis

  • max time kernel
    150s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    12-08-2024 01:44

General

  • Target

    bd47f5835e02d9041bdd585df0e12b0165e0f0ceb416cfa734c87b9f5421a3bc.exe

  • Size

    42KB

  • MD5

    84e7cb764ccdcedfbba9230deed896b1

  • SHA1

    ce5b8c638d16f67a0b7682eae6af69203790af72

  • SHA256

    bd47f5835e02d9041bdd585df0e12b0165e0f0ceb416cfa734c87b9f5421a3bc

  • SHA512

    e5fa0b54cf4e4677b519b96c0530064dd28872469376cb8cf861f1e905ae29a2ef8422ad3b342ee72aebafbd6ade76455fb52a7e2eab6aff63f8cf07d8186130

  • SSDEEP

    384:GBt7Br5xjL9A7AgA71Fbhvn+nDm0CAmmLg5Ms7spsZ8HYGkqvtJ+Jo/YdUdg:W7BlphA7pARFbhOm0CAbLg+so/YSi

Score
9/10

Malware Config

Signatures

  • Renames multiple (3838) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd47f5835e02d9041bdd585df0e12b0165e0f0ceb416cfa734c87b9f5421a3bc.exe
    "C:\Users\Admin\AppData\Local\Temp\bd47f5835e02d9041bdd585df0e12b0165e0f0ceb416cfa734c87b9f5421a3bc.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    42KB

    MD5

    50548439d1ff06b142243941eedc3be2

    SHA1

    b31805868793ed36f05c68bdcc74cbffa54dff30

    SHA256

    558ddb4009d41dea5acabdd3182f410d6322d63e03f7e781021aab28db2e9190

    SHA512

    563a798364c87c11c37352535f2f169422c51a668565244d375967c1669dd5926b11184a11bb1199f1493e28043746eb7ddfad13d930312b44c64ae8a8da9520

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    51KB

    MD5

    8725f8ad0d6721493916f314833f9fba

    SHA1

    a024d0764cdb0bde7ae6568253ba9b0ee32953fc

    SHA256

    f87dced4da51f9e57fc2d2fcc2288eca208e104c25e068c1f5d6683c3faa6f8f

    SHA512

    aade5af4085947936102a20aa2286d28dff40e173959931624af183840674be34031dec26e865d7759c7b32a1d7ada24bb5b075e5ecebe1001d3c9af42d1ac32