Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    17-08-2024 21:24

General

  • Target

    b0e6852180b4e4c223fee6af7d072940N.exe

  • Size

    54KB

  • MD5

    b0e6852180b4e4c223fee6af7d072940

  • SHA1

    ed8a5dd13321630d44311b853b388505db1ae1d2

  • SHA256

    df99e70373e1c8ce78062e7772134fb9829ef331c3fef0d32d4846305f92725e

  • SHA512

    1201403daf92110f4f4a2f18d320cef34c836999b8b392cd825f814d25e26f7cfa3088590426295e61d1103e8029437eb8dfd728ba99b9e2e3f9d89280917ec0

  • SSDEEP

    768:/7BlpQpARFbhn54fmiy+3BVr54fmiy+3BV6nsK8WKnFIMK8WKnFI9:/7ZQpApmi6nsKNKnF3KNKnFg

Score
9/10

Malware Config

Signatures

  • Renames multiple (3247) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b0e6852180b4e4c223fee6af7d072940N.exe
    "C:\Users\Admin\AppData\Local\Temp\b0e6852180b4e4c223fee6af7d072940N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2257386474-3982792636-3902186748-1000\desktop.ini.tmp

    Filesize

    54KB

    MD5

    ba4fd54ad69a032ac1c538cac7618e03

    SHA1

    4d393aa20ab2c190d958925d43f83d24989d4cf4

    SHA256

    fd467454a00f5a218f4578a86daa7f1cd57c264d9542a24bbc2ba28f095f9eb2

    SHA512

    bb398da687f6223525d2a833752139f3ff230bce89f600ee9e231a4000e18c7476e239b33af6db7b5d847468a49f5fb7cd5a1b30da8acdbda6819b501d80c7ec

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    63KB

    MD5

    632c3bc511ca601a27077ec7fefbfa48

    SHA1

    018d3aa6e8f4f477acab284860552b8704ddb45e

    SHA256

    5692014d75ff91c27bea77564fd667e0b3eaebbd1085ef01cb44c816b37e7838

    SHA512

    b917a65b3e4fd94e4ada6736eb84cd00d9c176793afd06d304ea5684a947ea21c0976d1dd0ee674bc3ece7fd80bc33b4cf7f9fb6428efe53573901f50440619b

  • memory/1368-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1368-74-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB