Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 01:49

General

  • Target

    31670441504513bf7e1d9ffe4bc38b20N.exe

  • Size

    38KB

  • MD5

    31670441504513bf7e1d9ffe4bc38b20

  • SHA1

    bfd029dff124716dcffd2785805e2903fedca014

  • SHA256

    be21382c1e1c693abd091accfa3d85905f5c565339fda770faa83a35f7d67c29

  • SHA512

    597bca7a88e342519e10888fe95315df2fa418844805a4f941e7d4e19bef339c9546208abb8e776fcb1724c7f18e48a1073691ab82ffbfce01f5500dad96eba7

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LOl6Sl5lswQ:W7ZhA7pApM21LOA1LOl6F

Score
9/10

Malware Config

Signatures

  • Renames multiple (3342) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\31670441504513bf7e1d9ffe4bc38b20N.exe
    "C:\Users\Admin\AppData\Local\Temp\31670441504513bf7e1d9ffe4bc38b20N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2924

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    38KB

    MD5

    828f62da393beeb4204f76e8c15b19d2

    SHA1

    7adaf9f3c0561cb8abc9304ed0bd74f8b1b31239

    SHA256

    bdb754d48b77402f72af1c554671fe99498e35e1f490deb29d1f1a8957642856

    SHA512

    4d09b610957e5f4769e0c9d1cbcea114565b26f8051887176d59ede25ca321aaf44841577aeffdd8b9627b529a23dc7af6955ca2dacd6b8c5caa98246d59ac70

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    47KB

    MD5

    bcf83fb41492e775ce8bdc1d68d49a08

    SHA1

    4fcfa468ed017cb655362e85b14bd6286589ab2f

    SHA256

    514395c580b81622e5a449e0d1719ad84a9f853baa62aea0e75803ccac64fc06

    SHA512

    0f3d96aad697762ec3949ce4d43467896ccae73764612358b6ce0b556141e5966af197e429f81fa192072f0d423689c2de661eacaeb6953c5cbb6a73241970c1