Analysis

  • max time kernel
    120s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 22:22

General

  • Target

    7bd0fe315177723393b23657a169ada0N.exe

  • Size

    42KB

  • MD5

    7bd0fe315177723393b23657a169ada0

  • SHA1

    fb08dd234889378f8595484f99703eb9a889dc6d

  • SHA256

    b570edf49095809b63f0d23280184ae290cfd05841792136d173f9cf55901547

  • SHA512

    89c0b5167114055d3918a242e29c8912e23e9fa114dcff71ebc578667abdcbe12e8035ce0a69b1df2287de36d4710434aa429e1071b492c791f88e55a94afdef

  • SSDEEP

    384:GBt7Br5xjL7lAgA71Fbhvt3hrjrnKvi1xDjrnKvi1xo:W7Blp9pARFbhnui1xDui1xo

Score
9/10

Malware Config

Signatures

  • Renames multiple (3434) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7bd0fe315177723393b23657a169ada0N.exe
    "C:\Users\Admin\AppData\Local\Temp\7bd0fe315177723393b23657a169ada0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

    Filesize

    42KB

    MD5

    c7d73b3eb0436ba76bd6b76d269c89bf

    SHA1

    cb1829e43ae2df9b50d191d3518a66dadf3b762d

    SHA256

    eadc54c9e673d54da8104ebd371e0a756cd6bd21279c73ba7388dcd0f439d91c

    SHA512

    19cb172c07558e0cfc330686ad7737bec1a4095f65a5463d271936a9b915cb593dd17b275c6899ff60420067447c1944cdea07b3b3a19fe88823725a257ecf86

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    51KB

    MD5

    3204fe08f428acf07ac6ea53c2ca2ffa

    SHA1

    0ff55db5e27c619995cb57e4f64fcebf87c30c6b

    SHA256

    fa996c9ce8546cbfbf8e7738ab362df6a8b5809b14f27e9c9089492a7ae7a6dd

    SHA512

    18a6cf21ed86c105c4ed8ba705c6ed57b0b8371205772dc481ee2215800da1c1c99087aee7633210fc0e22055c406c855fd7cc716b7ccba34affe7c54c9b2e3e