Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02/09/2024, 04:34

General

  • Target

    33c1df33d469f93f84023fa62e429660N.exe

  • Size

    79KB

  • MD5

    33c1df33d469f93f84023fa62e429660

  • SHA1

    fbcc19a7e5ac64d1627d176c085eec85a75af1a1

  • SHA256

    f01ca8ba63050ca886c228e5e69e745c50a2e70e98289873b08aa0399cfd32bf

  • SHA512

    13ea4ac45d8779ebd274befe096368e0ef459111a4373cd9774d43851fb197831a1ccda802a92307e9892f0b8f23e3f3bcf51bb317e6531993a83cf49006c420

  • SSDEEP

    1536:W7ZhA7pApvOsOKM4HBhaGwOQ54xEIjl0i/:6e7WpRaSljB

Score
9/10

Malware Config

Signatures

  • Renames multiple (3096) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\33c1df33d469f93f84023fa62e429660N.exe
    "C:\Users\Admin\AppData\Local\Temp\33c1df33d469f93f84023fa62e429660N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

    Filesize

    80KB

    MD5

    db6ad93d4473d9a043052f486204eec5

    SHA1

    33000548842f30088a980c3e4b538669ca988da1

    SHA256

    764b92dedc6723dd3da3a60d99932ed20f2b9752f7fe0c3a742b3b3aefcb7ed1

    SHA512

    140fe49d50d9059c5aef9e8a3a24d7d0c64e7f37d87502981c78ff612c46206079fe91dc04e3d34f86ed40b2825254dc64aa9c8326f63c9ab3212f89bc7b3d0b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    89KB

    MD5

    fa2c01f0aaf5c632ecaafa075909aa80

    SHA1

    8c5ca6b50a4b62acbf6c9a4928e49db951c4c575

    SHA256

    3aa017637ba2b7b345b3bfed081176b9fc7d2671ea08dc565c10c4dcc3df4f56

    SHA512

    91925952104e634e787d8d00e6940001251b398f792966a0790fab73e9a2f5ed6b19dc3ac33500ea9537bf0bd28bf00f59a843c383ed24a967db1bf614ca61cc