Analysis

  • max time kernel
    120s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2024, 12:58

General

  • Target

    f4b96b5d27a86b1e35c5e2063a597f40N.exe

  • Size

    36KB

  • MD5

    f4b96b5d27a86b1e35c5e2063a597f40

  • SHA1

    0bf32097b7a213e5074bcfea42752977c53a4f0b

  • SHA256

    e3480c69f0763601e3eafe004151aedc425e4c65d0563a6cba073215d8ff8a8f

  • SHA512

    455b5938a6d0fd0c0735e558052281f837933b4075470ae9d80bc496b2ddb41156383e768b562ae1f920b581749f318a6d4f54e85edfa6dbc82a69659f2d5b60

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LOl6Sl5ltGFB:W7ZhA7pApM21LOA1LOl6A6

Score
9/10

Malware Config

Signatures

  • Renames multiple (479) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f4b96b5d27a86b1e35c5e2063a597f40N.exe
    "C:\Users\Admin\AppData\Local\Temp\f4b96b5d27a86b1e35c5e2063a597f40N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2388

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

    Filesize

    36KB

    MD5

    33855fee648ac9e5e2d592179c6b33d0

    SHA1

    bca6e11ead1010d8403d159ebb02407c3d0b2cce

    SHA256

    b98bef79906f5f8f7e5ab12d167b965762f7a6b3c79467bb3baac68b96e558b1

    SHA512

    1a72a3737053c62975d2a74f3b7499500cf6afc0be81b3a02e36bd521c60c5be5bd0ff5ed321b7debdef2f6a797fac52b1656268e889cc90b0f4cfdd253adfc8

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    45KB

    MD5

    180ec23d142b2d2ddbba16b632e02617

    SHA1

    bd9cde796d32b52e336994d1820d69dc8f5152c6

    SHA256

    3ed35f49786b3ec214927211321777f59324fcaf70cf461106605b0c6ee61c32

    SHA512

    e4405cc80a81742095cbed75a6ae7ce917142b01071e24f73d3222b8684b43fc452bd5d268544399530d56c6ff69f2b54b7dc8ad0b90b7b3fd70d2ecb7585d54