Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 10:14

General

  • Target

    b0ff4bda7638471fed3f188c903883a0N.exe

  • Size

    67KB

  • MD5

    b0ff4bda7638471fed3f188c903883a0

  • SHA1

    c212f19276ff76267bc4902e96f2992c2cfa5d57

  • SHA256

    be81b6175de89ed930e806708b2e31f4e7c762677580d163faffcf965fdf2f14

  • SHA512

    eefcfaf9d511539a735f98ba0dbf62ceb75517e5d121c9161d4b7757c07e5d34c1add2b24219f23b07b85c1b8e311f0dc5c6b33102e5ce0a5c00c5388a1e8b6f

  • SSDEEP

    1536:/7ZQpApze+eJfFpsJOfFpsJ9VD6NVD6GUhYTYk:9QWpze+eJfFpsJOfFpsJjub8k

Score
9/10

Malware Config

Signatures

  • Renames multiple (3122) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b0ff4bda7638471fed3f188c903883a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\b0ff4bda7638471fed3f188c903883a0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1540

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

          Filesize

          67KB

          MD5

          ea6e70e2a98e1680deda1341ef5b6d1b

          SHA1

          77d34a856c40a72125d331582bcf359757b97419

          SHA256

          44760fd5dcb7003cdd31ccf96f6918f1f9301670637ae087c8641eb062291f99

          SHA512

          d6b2b17f3893f8d2f9be67c9f8bf49abad9064d257e8d6cd71cca1c16cd2812c2cfd8dceeb9f8519a1c3bd85acc2e1f14a85540f8879c8681c432d500a0a521f

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          76KB

          MD5

          1f62dcbc9c6a393a340f04e5eb9b51ca

          SHA1

          2466d80e9edd7625dc72a3d42e7c4c0c8e1ee134

          SHA256

          65cf1f5d61db999d9fa898e4b3ad9cd6de7a39ab066324888027bc7573c19c50

          SHA512

          873ff0f3d3600273e3a4bff2ac350b976dc25e1b3534c862c898a12b4b1c231f8043b169c6f668c0ac4d5ea64ed41cbe2713135b4bb703ec0b586fc8d87434e1

        • memory/1540-0-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/1540-70-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB