Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-09-2024 12:36

General

  • Target

    15b2e189a5d544eb3b35fdf206061270N.exe

  • Size

    40KB

  • MD5

    15b2e189a5d544eb3b35fdf206061270

  • SHA1

    156ab479917f5ea487d022112782ceeecb723219

  • SHA256

    7214080e6c5017e6cc075d2a868f00f647486aca10c0fedaa62ca02cdfef3f2e

  • SHA512

    d7c439992e052232e25d9f1ac1afb3dde0a3215dba9df0cceb14d49761b399ecde0266e28b36f05203e6d5b7fbdeb639952daa7b102cdef1bc38d73916fe3c2c

  • SSDEEP

    768:W7BlpppARFbhjbhPKueKudLw1LC5XQozeK:W7ZppApB785XQoZ

Score
9/10

Malware Config

Signatures

  • Renames multiple (3459) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\15b2e189a5d544eb3b35fdf206061270N.exe
    "C:\Users\Admin\AppData\Local\Temp\15b2e189a5d544eb3b35fdf206061270N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3290804112-2823094203-3137964600-1000\desktop.ini.tmp

    Filesize

    41KB

    MD5

    a1a54f5080e6b51dfd7f95e76c4f811f

    SHA1

    88e47871632ff30319acbd14e064d948d4d2b579

    SHA256

    bcbb322d8d81d0866ea07f4f8145cf708820202e83d9aab5d0505e5df8a78464

    SHA512

    0979e1c52d8a5d3db0cb92db5a29d54ae5498515b884361bd91176d12d7e3765d88d029b3e454463622f21a9f14d977fff3a49a9175c78fd70dd4dce4648445d

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    50KB

    MD5

    0e84bcdd7a30f5b068d4386935da6e03

    SHA1

    f35d4e08914bf3ea837c81a9e81efe08a78c5c6c

    SHA256

    f029d12377296fbed07a7295adcdbcd44a9e5feb44596b8fa3edc921e159fdac

    SHA512

    7c34ca1ae502a7c84fb8d59ff7687793b9d28822c7249d1c2e613e4feacce992da59f0a7e87beab83a2d0d59be1a07ed55c0a3f34380b4098b192554ea2d28fd