Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    20-08-2024 07:06

General

  • Target

    b1cf65e34cc6b76a20f6b4149da7c000N.exe

  • Size

    41KB

  • MD5

    b1cf65e34cc6b76a20f6b4149da7c000

  • SHA1

    60c8b415ed88849e0b41974c27ce0ed303ad1155

  • SHA256

    ec508d93e5071a56d9e740f47e26b332f083eb88912ab55316d1bb525243199c

  • SHA512

    786cf7ad536624745c848be2d897c8bcf817951ec6924e26712c6f0a44494e32fe531ca2ef451bdcf7519f93a331bf38d52231202ff44e01203290e96743a37f

  • SSDEEP

    384:yBs7Br5xjL8AgA71Fbhv/FzzwzgTAUAUvWAgvWAN:/7BlpQpARFbhNIgTu7us

Score
9/10

Malware Config

Signatures

  • Renames multiple (3350) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b1cf65e34cc6b76a20f6b4149da7c000N.exe
    "C:\Users\Admin\AppData\Local\Temp\b1cf65e34cc6b76a20f6b4149da7c000N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2172136094-3310281978-782691160-1000\desktop.ini.tmp

    Filesize

    41KB

    MD5

    d63c39f9fec1ce79cec7ef47aa6bb559

    SHA1

    9bbf6727a8da295c89558588e359d4accbf0c3b6

    SHA256

    219e3026b3f26157a25f4dd62c0deaf3133398a3f27015821af51ee33b41da8c

    SHA512

    92025a47b02f8b10a365cef804efa76578bc10bd2e9629300610c1b61bbc56e00eab1092ec603c2c956884410a831fb09dc26f056cd20a23ff52e0f8754ad88f

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    50KB

    MD5

    ea174a18ffb14d85d34b287be571b57f

    SHA1

    38bfd3c230f1dc816020ea1861fd26b90482b53f

    SHA256

    0486135e653ede372d72cf96b0aa9f5d928816c1545f8e4de5a09809eaf44ab6

    SHA512

    f581aae65f9115049e106e0920fd802d80398562a4acd23cf9dfa2c4c9d5f6c001582651ca05fae6f06eb5a2fc945340e9b29981b3be856e30e1f3b91a55cb1b

  • memory/2312-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2312-74-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB