Analysis

  • max time kernel
    119s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2024, 22:51

General

  • Target

    b54e24e76770413947186da0bd745820N.exe

  • Size

    46KB

  • MD5

    b54e24e76770413947186da0bd745820

  • SHA1

    a043c188154962901487bf7dfd3b8c69da11e0b0

  • SHA256

    31bd6d94206fda41ef227a6c2ec6ea3e5ec8f8e18eed311e2a9658228279a7d9

  • SHA512

    48ea648c65f4889ee3e0ea518c871ae49709d3301cf1cc44479bd148882336a733d28d82565c4be258ffafba990b7ad540a2a1afdbe3a77fe3700ff96f31dc31

  • SSDEEP

    768:W7BlpppARFbhHFoqAJwBqAJw1VyjVyumxubmxui:W7ZppApyVyjVyumxubmxui

Score
9/10

Malware Config

Signatures

  • Renames multiple (3273) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b54e24e76770413947186da0bd745820N.exe
    "C:\Users\Admin\AppData\Local\Temp\b54e24e76770413947186da0bd745820N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2852

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

          Filesize

          47KB

          MD5

          f6510fb118288a6209e09df51b0b1981

          SHA1

          1284d960239ff3252dd39bda6bce0ef7f63c5849

          SHA256

          e7768a80e6c82eb64a5dbb251029fcb409732a7e6c33d04ed0b1d8d5839eb51a

          SHA512

          0e41dd3273f091842428ea0ca7062d97c7840538bd73a4793ada8205a264672699e3825cb322fba704282b408bf653ee9bfe9c99a1668d3e55d3d99377b61676

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          56KB

          MD5

          da55e7d7bfad7f74c74dd7966ad32ee0

          SHA1

          0b8a4795605c595ce61bb5982b3cb935b032b84a

          SHA256

          29dba70039e8dadcf921fb2a008e84d2b988deab4f2da80d75a4ebca531b1220

          SHA512

          3ed2f9816e4894415b32e89a6c3c1f8165aaad8ae09c1dc05dc3fd35370efbf089cf728a650318e5ff87891610b3908b0529480826e447daca0879168907f038