Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 05:35

General

  • Target

    b05f8c5552d76480c2967241ca029fe2f9c8bc87713b09b9ae7b454013695d2cN.exe

  • Size

    55KB

  • MD5

    91467d8e8dc3d2dc605e809d3be0bd00

  • SHA1

    c9128fcd471f53ed5a926ef9c524de9032b563bb

  • SHA256

    b05f8c5552d76480c2967241ca029fe2f9c8bc87713b09b9ae7b454013695d2c

  • SHA512

    750516474397fb73a9b398cc05a2cfcd2a502c5a78adcf10192eecd59bb5183326ee3d291e407a5fa27b70ed20e11dea46e59c8235db39628a7115681b9979ea

  • SSDEEP

    1536:W7ZppApBULcfpHLcfpyDA6Uh3tS+AtS+QZVLZV1:6pWpBwchcwDOZVLZV1

Score
9/10

Malware Config

Signatures

  • Renames multiple (3218) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b05f8c5552d76480c2967241ca029fe2f9c8bc87713b09b9ae7b454013695d2cN.exe
    "C:\Users\Admin\AppData\Local\Temp\b05f8c5552d76480c2967241ca029fe2f9c8bc87713b09b9ae7b454013695d2cN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2084

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3290804112-2823094203-3137964600-1000\desktop.ini.tmp

    Filesize

    56KB

    MD5

    a3e8800064b7c913a48f0156b36498a1

    SHA1

    fdffde37d3c475a749ee1d2d5f87c2755ac88d1a

    SHA256

    05e0f69c8a76b2c79449207038b1a8f35c7bf96d75b93a2c979dc69bc2cc06fc

    SHA512

    7a9aa6cabfd802557a3ceb97032f2474dd87742a57583b3abdd616ddad9ab52667132ce29d187095c314505565b87ce34a6b2793ded9d1cb0b85aca064d9c21a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    65KB

    MD5

    1436d52c6ac69833fb564e00313be0e7

    SHA1

    4d9e51648aedc0c2bab41de25a96c150ccdb4a3c

    SHA256

    e2cf4a7ffeaca3da041bad3ffc11c2e0b123a35f7dd3997b81827214c58ed0be

    SHA512

    185f1d58f6c35b7afc383bf72f0a3fc83e793f940941c6cd5220d86356e96973729a9f50608c3191da92a3bbad9d82f82411f9714f8f4a8b41f12d99f7e5533d