Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21/08/2024, 14:34

General

  • Target

    13b859e4cc90aaa93f9eb72260200570N.exe

  • Size

    71KB

  • MD5

    13b859e4cc90aaa93f9eb72260200570

  • SHA1

    fed3c728adb8fa5301834396bb15cf1ba156dcff

  • SHA256

    90c5919dbbb5935ac227321e69bba3e324871f0d52d5fa07bc2d282e26303d77

  • SHA512

    28f67a01024d59130f0309722fd69277c043e17574a0c54116e7e3c44bb670d93d694a708d5118d299be082be57202a59d4a3f05e5d84ae8b1d2e39df806ce43

  • SSDEEP

    768:W7BlprpARFbhJ68nNIreUYEreUYX1n6mQmB/0BCTBC+hLMhLE:W7ZrpApJ68nNIreUvreUun65nMTMikE

Score
9/10

Malware Config

Signatures

  • Renames multiple (3068) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\13b859e4cc90aaa93f9eb72260200570N.exe
    "C:\Users\Admin\AppData\Local\Temp\13b859e4cc90aaa93f9eb72260200570N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2644

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

          Filesize

          71KB

          MD5

          60482efcffb0ddf9acab18f3c0684966

          SHA1

          388896798cd9b5a5371c20b84f44e740007c0b76

          SHA256

          6feeda9070e87ad7fcacd7c0b758097ac5522d6b23d08ed44903357a04f03e1e

          SHA512

          07fc7ed27b659cd997d2d7be8b15881b4bdf14b7a2d3ac68e6e041f5225f20818ae534027a3adb62aef1462509bf00a5dc630cb784eb16c44836948d07587c7f

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          80KB

          MD5

          b76bdeb4f8ada613063c9339f3eb0631

          SHA1

          500cdb11c4057c4fd911efb816806bd756cd6892

          SHA256

          5263520d42b342ae1484853b13b4c159eafc071f1276e7cbeb1c7a98fcc4f5e7

          SHA512

          710df7aeaf5776342f9d7ea33c8310282614ac6023416350c9c42305956bdafea320545d465ad4a2c818e6455622c829d1f7a7a4dcb2dd051bb373c50b3df732