Analysis

  • max time kernel
    119s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/09/2024, 17:52

General

  • Target

    b7462c9a6267be44659af93f16db6170N.exe

  • Size

    58KB

  • MD5

    b7462c9a6267be44659af93f16db6170

  • SHA1

    b3a4928f6280a52b44d8547e83fcb6584ba6ee30

  • SHA256

    96a37f4ce251e101a2166e35e7986a4a8c83d1249b11d9c7ef038cf893b64c2c

  • SHA512

    1c718164c739e9c1e275a2b820c36d397465d3d2673618e1bd5ed0ec5b13728d0e0fc5f514a3c0366e93a634963d41de1512fe91e6b03e28b4a38cf662638797

  • SSDEEP

    768:W7BlpNLpARFbhblkYlkuvIYFdqRHR0UkU1o5fOiJu6OiJfo5fOiJu6OiJiPjBvXO:W7ZNLpApCZuvIYXqRHRiePertvXtvk

Score
9/10

Malware Config

Signatures

  • Renames multiple (3201) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7462c9a6267be44659af93f16db6170N.exe
    "C:\Users\Admin\AppData\Local\Temp\b7462c9a6267be44659af93f16db6170N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3008

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini.tmp

          Filesize

          58KB

          MD5

          f5e0154bf261581f8c28c799708038ff

          SHA1

          31ef8e2b0999d989783b12913ef1c8f5db8aef55

          SHA256

          661b25f95f3d5357d6d5ca2945553a87c33be6fa3ea69207e4af1abd233ed790

          SHA512

          b1fc4a563d5f58ec7f0ff4498c6fd14ae90a12fe5279207099c1c97385bf7af8a5c7d4a407f9e80b18dbdb5d8768695d5292cdb85a7bb29b11fbecbd98815796

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          67KB

          MD5

          74b739cb195874bf6bbdc3a174e47be3

          SHA1

          f13f151c6a3cb37451031dc2ca1dcc5e497dcc89

          SHA256

          e8804b4d1a2624a76a2ce7f49a4a8c1d401e50e0f7b4636241a0eae1a1836bc9

          SHA512

          2851ee8f9eb51f4b47b0a7566cf506247b8ad9254113e4b138d21d116da61f794bda8b30cbb2e5274742efe82cf78decace5bbba896b8048c2a7aa763233ccc4