Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    24/08/2024, 12:49

General

  • Target

    f8bd423a7310b6b571bf4a4eb3992640N.exe

  • Size

    53KB

  • MD5

    f8bd423a7310b6b571bf4a4eb3992640

  • SHA1

    f9791c1d250541b1c57afa587e0a99c40846d3b3

  • SHA256

    b91fb8dd3621317c33c198ba242e678c1662816d54d012f68ce70abe835f4a9d

  • SHA512

    23b6dea37f7fd4555671d1880688601264b663db199279450f7844c311c461ee538c01d2476a5a2f757161101ec74650c06abf9d1f6aec4ce8a70fe016995275

  • SSDEEP

    768:W7BlphA7dASbSjJJ1EXBwzEXBwdcMcwBcCBcw/tio/tiFnwct:W7ZhA7dABJJ7TTQoQV

Score
9/10

Malware Config

Signatures

  • Renames multiple (3244) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f8bd423a7310b6b571bf4a4eb3992640N.exe
    "C:\Users\Admin\AppData\Local\Temp\f8bd423a7310b6b571bf4a4eb3992640N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    53KB

    MD5

    d542c204622032bd15b5b1cc3a8d3f41

    SHA1

    069cf065f066dd94e6dd45532254d55c3e0ae7e2

    SHA256

    5a353b109d4b05581fc28c8488aee5876c8f1bcc27ca45e1c8fa49640dee7637

    SHA512

    0ec3297198cbc0b0a13d9d89a4df5a7af930b8176a4eb92ee6a6f653d317d7d09866d201189090b6171cb01f55e788dbea370ed7fdef386ef8538ce197e06fcb

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    62KB

    MD5

    61945405378213bd7e166e42ad2bdac2

    SHA1

    e0f4f3e0eb139ef8e293f5538634e2fdba8ba1ca

    SHA256

    bfd2f3c74e6e413b26d2fcdc18fff9c55b65b3f0b4d1c524e305acd2423e6a2d

    SHA512

    e7f0b86af6240b2dee04bab2ced589f570aec81ea6a234462a935f3af169ecb6a5acff4c7069a602996cab316be76dfe98b97557d598eb113d00398e0b048008