Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    14-08-2024 19:54

General

  • Target

    bd4af74e15862253c01973affabb72a0N.exe

  • Size

    82KB

  • MD5

    bd4af74e15862253c01973affabb72a0

  • SHA1

    54ce17a44e99f70d279f156ab2f03fef10312813

  • SHA256

    41a59669ff9b1346d08fe57494fa23c68d02b446d0d78f406d2438badbb4b573

  • SHA512

    082a0b279b79fb4ad95d1066c62392b2b04abcd1deecdd2bbdc5166e7310c46a5801d55f205d78c17685dde1e48f99c2cc9bc3884e9057bae69a3aec02ff73d8

  • SSDEEP

    768:W7BlpDpARFbhYQkQjjIXYvPXzWPXzK3733uF4V7en5c5HChCrmh1444REXBwzEXx:W7ZDpApYbWjIoPyPoLzV7c6Sh1XH

Score
9/10

Malware Config

Signatures

  • Renames multiple (2859) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd4af74e15862253c01973affabb72a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\bd4af74e15862253c01973affabb72a0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2272

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

    Filesize

    82KB

    MD5

    3bf747f1bca6ad4ff7fc1f9453f178f2

    SHA1

    0ebedcf609b42b6bdb89ae08df2fc1da253248c8

    SHA256

    a1fb02f0a9cd160933f01394c596a78bf0e5e2997cc3cefba3a67c029293abd9

    SHA512

    0dc578bf89483f62e9729fedd239a779cdadf28c116e7f685cbd2d02e62877dfa868826391c7f56f68cb8bbd9941d80041975c3c826dedcdb547fdffd8fa41b9

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    91KB

    MD5

    8cc1c3a69d0bd494d0ed3ad52af981b2

    SHA1

    f92db0ce146457d23f4a7cdb3dfba8ab45598806

    SHA256

    82baed3a4f610946d3249f4976084be8eea846b2d1ad4274d5a5a641985ebd08

    SHA512

    40f43888c1cf3ea3e27d11e9b7f15c7c9c0c98b21fe5df7cc98b6c3bdbc307a9f8ceb366c912eafec2bfaab7318d430dbcd755cfdd4482b148d5d11fbb1e2162