Analysis

  • max time kernel
    149s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    16/08/2024, 20:35

General

  • Target

    2b0ba1f4012af15b916aaa8616a1b94084cb10c17c53f30ad81eb8415439f08e.exe

  • Size

    50KB

  • MD5

    d062273aa0f50e4f40100d95e56f73b6

  • SHA1

    4104ae52251baa6df721bb007d5c4a0815a96c46

  • SHA256

    2b0ba1f4012af15b916aaa8616a1b94084cb10c17c53f30ad81eb8415439f08e

  • SHA512

    e3b4470930fbc5dd258e06f3e399c5bf012e26c78ba2cf16ab76db20ee14315a1fc4f25184b65c69983b04080e952f63fb0599e6e55fa38539187f2f14832dba

  • SSDEEP

    768:W7BlpppARFbhknrzzA8JQ2AdJCzA8JQ2AdJWX0kXX0krDzgpQZ+zzgpQZ+e:W7ZppApkGpaI4e

Score
9/10

Malware Config

Signatures

  • Renames multiple (3701) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2b0ba1f4012af15b916aaa8616a1b94084cb10c17c53f30ad81eb8415439f08e.exe
    "C:\Users\Admin\AppData\Local\Temp\2b0ba1f4012af15b916aaa8616a1b94084cb10c17c53f30ad81eb8415439f08e.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2524

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

          Filesize

          51KB

          MD5

          ca54462f75e5f2144ce0a3974b42c9c1

          SHA1

          54b577f46b69d4ca87acff4c7d8a2634cfd374b0

          SHA256

          a9e4efda3392efb155ae9dfcbbd19df0da4b93687916d3c3331df4a779056802

          SHA512

          93a0abd66fbd4a0b3a4734808d428bb40a7bb966636378f9d05951b6d46b3c0f643836a8801909b4c53bf19fd07a668bb9f186d5b263ef2ccc8b678a3732072b

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          59KB

          MD5

          ab81b892d67a58047b256159f27511a6

          SHA1

          d15302d35da3867f9708858f6af90cb92137b3c3

          SHA256

          677385023398eefb3d865f48f67e2b59de3ee19f1599034083d4e80a1cb86d17

          SHA512

          9bd9a5b4acb417fbefa2551878caeeb23badced68def4a7348ade680bd1c9c0e2a99cd457a15f6f74b470f3b4ec819421a8e4160cabea5891c5cb6c18ca8a6a9