Analysis

  • max time kernel
    120s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 07:09

General

  • Target

    bc27dca2466418f144e2eb96d0bfade02979e9a59bb2d7af9648c25529b14c62N.exe

  • Size

    41KB

  • MD5

    107fe5501e6442465221c08ac32ddfb0

  • SHA1

    7b98b1acdefdd2b2e7044cefff8c65e969cebceb

  • SHA256

    bc27dca2466418f144e2eb96d0bfade02979e9a59bb2d7af9648c25529b14c62

  • SHA512

    455fa9209f0ab1c05d7251d41b71c7815409ab10f5d243df6da64653a39229ae565b6ef0cf926546201779d08ebcab48aa531da12a33be1bfa666d194bd06f23

  • SSDEEP

    384:GBt7Br5xjL9A7AgA71FbhvnwR/s4Nkq81LOyq81LOUqKqeU3cLUA38gdcLUA38g0:W7BlphA7pARFbhM0Kkq81LOyq81LOk

Score
9/10

Malware Config

Signatures

  • Renames multiple (452) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc27dca2466418f144e2eb96d0bfade02979e9a59bb2d7af9648c25529b14c62N.exe
    "C:\Users\Admin\AppData\Local\Temp\bc27dca2466418f144e2eb96d0bfade02979e9a59bb2d7af9648c25529b14c62N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2248

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-457978338-2990298471-2379561640-1000\desktop.ini.tmp

    Filesize

    41KB

    MD5

    ac78b66f4fa83077f8d8776b78f13f92

    SHA1

    454c066bee7389c077968b572c0e57e502fb2024

    SHA256

    405b8d1eb34991554452ccc5ced408c33c302ecd410a8ec9035c665ff0da2a79

    SHA512

    529b5d539f0ea26c649b8e524e440bfaab470a4ef1bc81e4604a2605f721f53d8a1299741f35315e7e362e3616b44b92c96901750dbd51e431e2e44a7313ce9b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    50KB

    MD5

    5937a341a3ef2a92e67eb15da1e33a4a

    SHA1

    a815670c6ffbd91cdc3d51a5b34ad571c7e3a3af

    SHA256

    e0add96b0abfc96ff003fba7129bb3aa899d95f48978d6a196c5bcdb0c5aeff0

    SHA512

    52e412738e3ba277e32ba8dd56bdcc8b2e0fe4365c301700532697e2a75f34842cfc820167354b82ac95d00308cb8c2bdd858af4a1cedc63d614510e9c231eeb