Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 12:13

General

  • Target

    bd8011044e66a04ee28da89313b8e2f34bb8e3d9294b146891af4528007b1d25N.exe

  • Size

    49KB

  • MD5

    dae54ced0343cf1c32743d43236aca30

  • SHA1

    bcc205a0c2aae30c1b5ef8d34f31de650ac153ea

  • SHA256

    bd8011044e66a04ee28da89313b8e2f34bb8e3d9294b146891af4528007b1d25

  • SHA512

    6d7239903f19e6236118d79860a452e539628d8f9f2363437558d179cac93be5b8c82ab945810107e61460c20199499cf1ff4e7a88fa18104aabf7b39e2b8548

  • SSDEEP

    768:W7Blp2sspARFbh5YSfff9n1oXKCqzEIn1oXKCqzEy7NqOJyjqOJy2:W7Z2sspAp5YSfffR7NDgDX

Score
9/10

Malware Config

Signatures

  • Renames multiple (3242) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd8011044e66a04ee28da89313b8e2f34bb8e3d9294b146891af4528007b1d25N.exe
    "C:\Users\Admin\AppData\Local\Temp\bd8011044e66a04ee28da89313b8e2f34bb8e3d9294b146891af4528007b1d25N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2292

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3063565911-2056067323-3330884624-1000\desktop.ini.tmp

    Filesize

    49KB

    MD5

    48930ae60d89505b1f7f4b9cf53b00d1

    SHA1

    177de86ea0f73a6c8a45102570ec96ec5bc460bf

    SHA256

    e84e55ded0270f39ebacc78a466421027eab6180704ae8c39d6bf522dea8d1c4

    SHA512

    2091eb3af5a41fe8b76f86b6e047e86f70e2bc731787d254dbd27993f57a9b7384db3f194b47f7d00dc8308f7a9d509adae86f332541713d816f437e282a06b3

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    58KB

    MD5

    8a1374a1600d70f4fca8c12fc8f9898e

    SHA1

    787786e89803953e28d175c3f3ccfc4135dad688

    SHA256

    18461f6879686641ac13aa884f05908074ec9f3991a1b5af3c3e23fd0845284d

    SHA512

    91461a362e031941dfb1772c5a1c2cf67ff0c4fcfce601c71eb486a183c1cbb96ac53b8cfcd651a936e4bbd9e33baab15222c76af6ae3332777655610915f866