Analysis

  • max time kernel
    149s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19-08-2024 15:17

General

  • Target

    13833e2919c36bee370ce912ea646790N.exe

  • Size

    45KB

  • MD5

    13833e2919c36bee370ce912ea646790

  • SHA1

    e332994ee2cea4189327dd5e39d24acd55a561ef

  • SHA256

    9ed5abce52903d0fddd0026a956b66c1e29d437d02051776142316e47bf936ce

  • SHA512

    8d04191e082e4334f6ef1338e0fe7007e8f048d9da23ed133f64e3c04e071b13d31ad8c9a12b08fcf57bb77eeac63e2af31f06d64f54465065f1f7b46db85e23

  • SSDEEP

    384:GBt7Br5xjL7lAgA71Fbhvt3Gb9CGDb9CGBjUDXV8gcjUDXV8gH:W7Blp9pARFbhOCQCPjZ

Score
9/10

Malware Config

Signatures

  • Renames multiple (3789) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\13833e2919c36bee370ce912ea646790N.exe
    "C:\Users\Admin\AppData\Local\Temp\13833e2919c36bee370ce912ea646790N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    45KB

    MD5

    b219b5d008b9106e0e96ad036c05d189

    SHA1

    1a23955309c58a1c23818aff38f68b6632beb409

    SHA256

    1cfe360865b34f81b3aba6a8196414ebe4b1e2751a285e745d6c9d303d241f13

    SHA512

    43334639ba45818f05c7c7dea3aa89bbf89f1027ca34271ee0929d838da6d1e133846d3b61998e799176842e1f9fcda9d2fa66d6ec881df3cfa7de1adc6963a1

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    54KB

    MD5

    c867add4827b2c700e5e51ccddc7ae00

    SHA1

    a0edbfdd7754363de2cb8d948a5a4ded6b43c6bc

    SHA256

    44106c5eecfaeb36aadec48089145f261055f540a52d2d450357b95f7f7c82a3

    SHA512

    54a7d3d43f74381d6bdf089b551b4bcd8ee5d6f778a5d67c50e7536d8b3a7291423822545961254124b6388136cfed3c77a3760cdac4572e73e59dd0750d5e01