Analysis

  • max time kernel
    120s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    28-08-2024 20:34

General

  • Target

    b38e156165d5dfb188375a6e28f79ed0N.exe

  • Size

    92KB

  • MD5

    b38e156165d5dfb188375a6e28f79ed0

  • SHA1

    33d0490bc7753783ce201057227a266b82fc3ae8

  • SHA256

    4fb8075a0156672b49562fdc02571accd05eed1be5dbe427871a1ab1f9f98b32

  • SHA512

    4b16f2af0551cf3fefc32e486b9c9029feac29138fd9779b53e9ed8e211c60910fe3b67138c877f9b596b3586cade0c254d6370d62d978a65350b217c96c378b

  • SSDEEP

    1536:W7Z2sspApGg7bobSM+t58qKcAK+j4nI4VfNgZ11PED4gJQeAAUZa0EzOMN:62ssWpGgrM+t58qKcAK+j4n7ByeFUG

Score
9/10

Malware Config

Signatures

  • Renames multiple (332) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b38e156165d5dfb188375a6e28f79ed0N.exe
    "C:\Users\Admin\AppData\Local\Temp\b38e156165d5dfb188375a6e28f79ed0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

    Filesize

    93KB

    MD5

    55376ae35e9ca102a9868fc962f9f793

    SHA1

    d6a61194c480b7ea440c66dd067469733f5537d2

    SHA256

    9eb275a8e925da937f218c1a8653f50c2c0b52c330a2a448da36418b03f33307

    SHA512

    cc36e82a2e35cdc674d62226e4b1447a2c090d6acbfc09029cfa799edb1353db3f988f761471f8e26de347c5bd8ddc1ca97033377093fe1a7d3dacfcdb3dd579

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    101KB

    MD5

    2bf0775253a49f4b98c1c216ef4c6305

    SHA1

    fd527ce88c81f0bf5bb59fa0337bbe3c3f69c91e

    SHA256

    c0f017652544e3163c66c5affff397660ca1c6f607daf4a4ff501fe53015fe65

    SHA512

    a48413146a1e11ffd814ebc7372afe588a9d6fec7ae4ff533b842d63076f170f5d2eede243e7fa632f33cde423eb74e6111321ef60e075b96fd2af8056d37dae