Analysis

  • max time kernel
    120s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15/09/2024, 02:20

General

  • Target

    b391671d351174886472f585ceca6740N.exe

  • Size

    42KB

  • MD5

    b391671d351174886472f585ceca6740

  • SHA1

    7c46ec121ee40ae20618f04c0a0be2c2c1f1bbd5

  • SHA256

    a0d0a7279bc5593e5c270ad07ea8fdd1c2a4425627f2c1260eac6121d0c05b01

  • SHA512

    cfb75cb4d4ec50c0a1ec064cc5ffa306a1668b321b315232a16c5af9a18e4ac6179efdfa7311ab2edefaa945767faf655fe9c8904b9b2a85032fd46d4e6979e3

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LOw2pqpF+i:W7ZhA7pApM21LOA1LOrwL

Score
9/10

Malware Config

Signatures

  • Renames multiple (332) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b391671d351174886472f585ceca6740N.exe
    "C:\Users\Admin\AppData\Local\Temp\b391671d351174886472f585ceca6740N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-457978338-2990298471-2379561640-1000\desktop.ini.tmp

    Filesize

    42KB

    MD5

    3b840253dd3d423ff98b6d5e1ae62722

    SHA1

    a8647719aa0cc5a1a0991800fe3903bf4c2f5c75

    SHA256

    93f8a08c4e229791383a8ccd1e1244f484661b7ca7064c7cdc717d57c39e932c

    SHA512

    ef192e2f7f023691c4452f31cd0677b36fd13b32dd9b1704f6056d59e1c6ab2ecc1f715135792381bda20ed6478bd9e289b48523081190b47e778cc63d85efd4

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    51KB

    MD5

    c3afeef7a6400bc57cead2433e92f8bb

    SHA1

    8d5e539ecd1dad981d30efd8572ceb9359ac1759

    SHA256

    9a93a8e3a7ab2e1875d6aa808dd57f3686a46c5880df320672e241666da30a0f

    SHA512

    abece0709e57a4d08294d4a3542ace608d1aef8c72d8586421c4c97e88224b9faf193773254720ef730b9d672c25b4b8fb95897dd53e848f2c137545f08eb473