Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    21/08/2024, 19:43

General

  • Target

    8b5739941d1f55dd1a2a3f7239005f20N.exe

  • Size

    43KB

  • MD5

    8b5739941d1f55dd1a2a3f7239005f20

  • SHA1

    b315f3374f1958971fe1c1e32c1052a331c71c9a

  • SHA256

    cdc100a325396394970ced6428ad3cc3a7aecda4ff5ea41b7f80a311fd31a4d3

  • SHA512

    02edb50450f10c1e613eeb5fad1fb0d5f630e54eb74afb7253b393c04239b00ba14be94cd31b3161c6e285872ad5ede6f4bc88d1ce98d61248e06be77d7a2a6a

  • SSDEEP

    384:yBs7Br5xjL8AgA71Fbhv/F1Ue80EoVvSWqvrB/EoVvSWqvrBU:/7BlpQpARFbhzUe80ESvSWk/ESvSWkU

Score
9/10

Malware Config

Signatures

  • Renames multiple (3228) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b5739941d1f55dd1a2a3f7239005f20N.exe
    "C:\Users\Admin\AppData\Local\Temp\8b5739941d1f55dd1a2a3f7239005f20N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1772

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2172136094-3310281978-782691160-1000\desktop.ini.tmp

          Filesize

          43KB

          MD5

          d5d4bdafe2e32e44f735c9d405ce5c5b

          SHA1

          57cc1caf882b5c9fcd13430b615a760f26640af7

          SHA256

          1070aea7e88df329cba15a56d3d9d80ff929896aa2ce14fe2ce3bdd0ef16017a

          SHA512

          42780e62095f395fad4bdd0e34012c4b2375be7674b825b77d86187e1f280a4691a364db2d3f35eac35ffa1c9e56ed72dd65ba39e9ddac56c09431b7dfe352a5

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          52KB

          MD5

          f32600238c54d9b181ad5c26d4e58936

          SHA1

          7d968b362b31ff5cbc5b3d538194ae9917622ec6

          SHA256

          79a713e5d72b7d767349ff90cf0842f93a46aa3f06d5bed1a5de4a998e08e490

          SHA512

          b8ed6133f332f92d5391b71e0736e13f67543ecfa75213a972b4f111bb6cc0a2bc0bfee3002d8c25a6ee66619f5a349d7892bbf2e456de5aecc986e60172d615

        • memory/1772-0-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/1772-68-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB