Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26-07-2024 13:35

General

  • Target

    13f561d796f906fa613aa5f0b670f870N.exe

  • Size

    38KB

  • MD5

    13f561d796f906fa613aa5f0b670f870

  • SHA1

    d89c5fb7d3b667c64a2d588c5293e4731f26f0b4

  • SHA256

    c45ac23089fa4f88d2725b10c3ce721d176ad284e62c1e88fd5eefa3e57551ba

  • SHA512

    38c9b13095751dbf712d0bbe64dc6a694ee27d74ff815aae588f2f3cfd5f6eb00afcd32361150f0e5d80ebfca4dfd15ab8ed26eb204b966de16094e25714546e

  • SSDEEP

    384:yBs7Br5xjL8AgA71Fbhv/F40U0qAiAJOHAiAJO7:/7BlpQpARFbhSnwiAJxiAJ6

Score
9/10

Malware Config

Signatures

  • Renames multiple (2693) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\13f561d796f906fa613aa5f0b670f870N.exe
    "C:\Users\Admin\AppData\Local\Temp\13f561d796f906fa613aa5f0b670f870N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini.tmp

    Filesize

    38KB

    MD5

    82f2ee438409e4c4473899a39a6afdcd

    SHA1

    9ea38fff5a68d0604e3eb686d4bf31376aa82ffb

    SHA256

    9df015af023f658b675f34fd4e59e44e33943f8410603cfcba9486274b88f98c

    SHA512

    ae17873856bc565246fea756af7f43e394aaa399fa88662838e5c8ab8c3ef6b448b2b593ba47846beb6f8695626ba0c54f6a3a1a8ca470291d326625d8be8428

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    47KB

    MD5

    7897b18d9d35599e309f457b89eece37

    SHA1

    da5eda3bd89fd66139ef8a70a487d55463a47db2

    SHA256

    191b0e8693f350dc94777fc62b85ef528be07d12f6378cd75dd09c5f5fdf7931

    SHA512

    2bd2d86141320ed6514065a123fa76abf2c0949c96189fb0f03e65f3c6c74193443e572ec590e370674f32868d5fad6f6b778a9b0f6cb8f20ea4d28a27faaacd

  • memory/2544-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2544-160-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB