Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-09-2024 15:08

General

  • Target

    b95cd34e71920a0735d100eec88a5eb0N.exe

  • Size

    81KB

  • MD5

    b95cd34e71920a0735d100eec88a5eb0

  • SHA1

    db4745747a481e4130683b3134d6b05aa4900fb1

  • SHA256

    fae9747fba139d913505b1faa98bc04da6ab57ff4e47718aafa506ff00b1370b

  • SHA512

    f6db80e24387b0f8d3e6168cd0e2312dd03e9ec6ddc3140049d3cb57653d500bd55bdea2ae79378537cf3dde01d3bf40348a020b937d9443d245c8c58ca1da26

  • SSDEEP

    768:W7BlpDpARFbhYQkQjjLaMaRRpi1xnRpi1xOYJIJDYJIJMFhWFhCmDpBIjsZORReH:W7ZDpApYbWj2WTWJe+e/qXhgb

Score
9/10

Malware Config

Signatures

  • Renames multiple (3146) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b95cd34e71920a0735d100eec88a5eb0N.exe
    "C:\Users\Admin\AppData\Local\Temp\b95cd34e71920a0735d100eec88a5eb0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2376

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini.tmp

    Filesize

    82KB

    MD5

    7f40f3d445bad145dda9a97423a1bf32

    SHA1

    ddf983ea132e6bda8fa33bb0fc95c5fdd9bedd6b

    SHA256

    3354712f7ee00e2790aebd6dd618387dc775caed8fb4592768cffd0f514d3f5e

    SHA512

    b8f5abf6ce844a437d61ed1934598e73bcd70a635dc69c5a41f4d2dfed32404bbcac61e8e6f5e492791804957766d6ddb7bcb32f7366052fa572810ebb382a00

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    91KB

    MD5

    9ba574cb8b634d04f63379abf71ef4e1

    SHA1

    bc835e040ff4ba926a7c6c82d19b8789d06a7f00

    SHA256

    10c507580bbda4bfd014439840892a6fd6b9155ab41d24cf5b84406c4e68fcb6

    SHA512

    b321639141550d2cb78db0489412e180b06453c8ac9ad1fd22642a2dc7ecf96dba21bf320efb4435ea8f3d364f94c0034f47a316f8fa9e57de62f7f009d7016d