Analysis

  • max time kernel
    120s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 19:10

General

  • Target

    b095a141fbf2f24dd91a78e3ce46d7f0N.exe

  • Size

    49KB

  • MD5

    b095a141fbf2f24dd91a78e3ce46d7f0

  • SHA1

    135d1efc233e155cd2c697fea07a6637973a6c86

  • SHA256

    de047c5cf8031ead099a0643a342c056ff07469cb56b8c58ff3044a37657484c

  • SHA512

    8c369fa5173a7c8cfe7aa669e5d47f7416846baf0f39e7db725c0a48d618ed969097ccbc9690d0b93e1ab7c649673da3ff542ce4c33374380e48781ba66be0a2

  • SSDEEP

    1536:W7ZppApBULcfpHLcfpyDoAQeLeAeLeJ0HJPWyPRsJPWyPRP:6pWpBwchcwD+hmh1

Score
9/10

Malware Config

Signatures

  • Renames multiple (3192) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b095a141fbf2f24dd91a78e3ce46d7f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\b095a141fbf2f24dd91a78e3ce46d7f0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2252

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    50KB

    MD5

    cc138fa0347194139c9ee37b956ecb93

    SHA1

    7f67c74cfc26bdb8ccfca979f2ecd726aeeec4e0

    SHA256

    992bfd5f69d51311e3625fd48345824337e99867a4d3fb4a1eced2b4f57da0fe

    SHA512

    f37334465326be97950d8239bafd2a3d77c989ab5effca80985fb53228cdba86320a7c461d5af68eb9ac9305a679b4dedf4bd22c0618260b2751df121fb3ef2d

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    59KB

    MD5

    ad4ccbbe6d414f5fcbaefdc59d7af4d1

    SHA1

    c7028641a9ef598d23d7e9f6203ddd8d16afc1d4

    SHA256

    9a5e78f0ab17e07c0370f265cbef993a59822d0317b7bea0f09c61172c97ecc0

    SHA512

    62193abfbb026e231266d9c3fd7f6f31c40fdad2309c8e636f34f93f1a3a0b01003abaf1111395eed6fd40c1c78669e76c6aa6a7c5f40c8ec5518acf6f60b4f1