Analysis

  • max time kernel
    120s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2024, 07:42

General

  • Target

    d2bc4f6a66c0e74e459082fb487d56e0N.exe

  • Size

    75KB

  • MD5

    d2bc4f6a66c0e74e459082fb487d56e0

  • SHA1

    c80f2ba3d2d97d29d950077843b4ee29ea68410b

  • SHA256

    140d67885b12bed438d48db859fb2cca9bc0319d391f4a599e8ab97cfa26ccbd

  • SHA512

    74fb75c530a881834dea20bd18626ff165dbf1d6e3f1a6c0781a147b0da860807f18a200b56cf9e5cd33a5859eee1dc278497a5408f86a72c33a38da2bcbb18c

  • SSDEEP

    1536:/7ZQpApze+eJfFpsJOfFpsJ5DVSWu0SWugWL:9QWpze+eJfFpsJOfFpsJ5DVSWu0SWuN

Score
9/10

Malware Config

Signatures

  • Renames multiple (456) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d2bc4f6a66c0e74e459082fb487d56e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\d2bc4f6a66c0e74e459082fb487d56e0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1140

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

          Filesize

          76KB

          MD5

          b1dfb20d8c6fb647bd56b2b27500664b

          SHA1

          e7541e2eba2cf503d223a76f450a96bcf0779aa8

          SHA256

          93bf31eae33c6126af170ec18082e038b3a526d6bdad1a04ad7935462a3a04f0

          SHA512

          49da72d990ce521bc546593698a0cdae2eb4aca1c057fe41ba2c41fa9d7dddbd0d13a3591f544448dc7ed730573305581f945f24e6b850ffc81c1528ed0eef85

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          85KB

          MD5

          27ca6714398dbcc311fc39a20190d4da

          SHA1

          2f76c1ea7c2436e4f6bd5368a0dc517b33953a8f

          SHA256

          db404d0f0a7561524e945a58237c52efbf7af5f88420bcd0ff78d33f9bce3dde

          SHA512

          cda841fbdc8c17a0280be2a0fc40c1a46aacac48e0df4941b69cfc54029b014b0dd11ced19927212468dcaa1f2d0d5522be1a631c982f8c9d9db419944455ff7

        • memory/1140-0-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/1140-26-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB