Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    23-07-2024 22:09

General

  • Target

    13aefc768a002fbcfd0c03f76c02d850N.exe

  • Size

    63KB

  • MD5

    13aefc768a002fbcfd0c03f76c02d850

  • SHA1

    c3a77f72d047cae4d4ab53126e19b68bec8fd46f

  • SHA256

    ff023bbb29933f5a589306bef5614a7262cc6f88435d4031b398b58fe9091188

  • SHA512

    b33e5762d665bd7639371743297a8a76cc78e466ebf56fd2c745365353b4c08fe43d07906001c109d089e2122d0adfd72919782bad399fcb665f0312ee61fd62

  • SSDEEP

    1536:W7ZNLpApCZuvIYXxJ75sNpJJ75sNpyPIXxXhTi:6NLWpCZLYFXxXhTi

Score
9/10

Malware Config

Signatures

  • Renames multiple (3093) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\13aefc768a002fbcfd0c03f76c02d850N.exe
    "C:\Users\Admin\AppData\Local\Temp\13aefc768a002fbcfd0c03f76c02d850N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2660163958-4080398480-1122754539-1000\desktop.ini.tmp

    Filesize

    64KB

    MD5

    b5f99ba635c47be824d644ecf307df0e

    SHA1

    8cf0768f91a17b6d6f0cae590b04da74bd0a3a82

    SHA256

    5ff864948ec55da577397127bd3d831a2b03e97a4391323dc6681967e8e3f83e

    SHA512

    f6e82c415bdf62753dd7a2842d6bc23c99d6b5afd90255d9e3c3edf4adf3c7ec3fa84abe7928b52a22680e03265a3177e4f45834664ab8668b1bacac06bd5315

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    73KB

    MD5

    62dadcac0b01c315d8d597613e12f626

    SHA1

    7db8b65692b927990ed2e5b84031cae47acd5572

    SHA256

    08d10b1c43e6dfd6f8e7f4cbf51ea47368573137331701bbb7a3717cea62c06c

    SHA512

    f4cec5a42f1b1c450b2caaba37b9b7e69c0b8ad3b5cdae6145942453f3816c281ef34ea383ce3b57ed973c9643bac35739e43996269df34496539b6ab0ebf3c6