Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    28-08-2024 20:31

General

  • Target

    2bf55559dcb9e30887695ef1a04abb20N.exe

  • Size

    41KB

  • MD5

    2bf55559dcb9e30887695ef1a04abb20

  • SHA1

    8077a1d239de3830edb4f30be450e5dbbf4e6aa8

  • SHA256

    749c8e561987b7d5192af9f54f2f01c8bb4962b490605514a35e01ea2903b259

  • SHA512

    65405520e3d414273ac1547627e15a2fea51ed4ac09c4bd4e11cf0139d2d1c88fb3da49790a9155bd97412b8459f8622631eeeb48ee5c25ba1848e9c791fcd45

  • SSDEEP

    384:yBs7Br5xjL8AgA71Fbhv/Fzzwzl83/Cqy:/7BlpQpARFbhNII/C

Score
9/10

Malware Config

Signatures

  • Renames multiple (3258) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2bf55559dcb9e30887695ef1a04abb20N.exe
    "C:\Users\Admin\AppData\Local\Temp\2bf55559dcb9e30887695ef1a04abb20N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2232

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2257386474-3982792636-3902186748-1000\desktop.ini.tmp

    Filesize

    42KB

    MD5

    d2d763a646b75bb6767b09e73065007a

    SHA1

    6028ef4a313806ef09634fd23f7eb8edb3579305

    SHA256

    9b055338440f4e0e34980c37f85190cec2261ae95003fdccb9a1c0fefc343249

    SHA512

    56dc6fe582626f4782a20127691158c87ac4d03e8076120769710c15449653910611690ec4e4fc5976dd497a29d50248b20c807804271e02d263e0418f334b14

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    50KB

    MD5

    31f6e17a71be6fcfcf0ad7288cc62292

    SHA1

    ced985c2300ac5d5c36cca495f4d4bd78410f53e

    SHA256

    48746c49e4b746a131348b03da850e2bf802159a999b6a4da4e7a8ed3b556c85

    SHA512

    96c4c81b708c388f2efdee6fddce9b6dee889dc490cd2e3e5804c316918470d292856529c02cb2e915abdd09ff0e7bf5990b6082982abd73e528160557b4d9f9

  • memory/2232-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2232-70-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB