Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    10/08/2024, 20:28

General

  • Target

    36666a098639ccefb25fdb2d09fde93c86128552132445d5189a6305e8318d77.exe

  • Size

    39KB

  • MD5

    57f763c6c4bf06633dfa30581b3f99a4

  • SHA1

    abfdfed9b6f6403e8bb30f32127c44ecf3e3d89c

  • SHA256

    36666a098639ccefb25fdb2d09fde93c86128552132445d5189a6305e8318d77

  • SHA512

    8eef37ada69e4e692899fc287aa35d29b9e2b2a43d435acdb8bc074476babc11f1efefa898741d0fcbf97a330a482e17265a3bb3f6e73eb47b7172f0b0fd96f3

  • SSDEEP

    384:yBs7Br5xjL8AgA71Fbhv/FzzwzfIfHLW/l:/7BlpQpARFbhNIV/l

Score
9/10

Malware Config

Signatures

  • Renames multiple (3770) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\36666a098639ccefb25fdb2d09fde93c86128552132445d5189a6305e8318d77.exe
    "C:\Users\Admin\AppData\Local\Temp\36666a098639ccefb25fdb2d09fde93c86128552132445d5189a6305e8318d77.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2344

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

    Filesize

    39KB

    MD5

    68a3dc5470ef2bdb25aa2abb966fca48

    SHA1

    cab11841ee9d24eb12249071590489d55fd09c02

    SHA256

    ac2fe87b4b9b6bb165466e0ef60d52b4ad0188d86e4a61ca0dd872a8bf7c558d

    SHA512

    a117295d1d2a0775218444955c213b0c6fa5674ded0f0da5d6f69db82c3ab4813a5b67cdd85e008a74517ad157ff615a2928747d164b9b394e0ad98f0f0b8f1a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    48KB

    MD5

    651cf4130a36cdfe07dd975062ea44d1

    SHA1

    7632cfb8190cb7fb539d4ec4b9b353f732ab2eca

    SHA256

    76daeb43fcdaac93525600d234d8f776540c9de8752200e5e73fa4f0b338ccae

    SHA512

    83c032441a54dc3c8263bfde9dff04de0bc8122d72252ac4be8024810a0a1b2043ddfc25c0a6a89b783e96cf6fcbee36c00915391a3c9d292b39ceaa92753899

  • memory/2344-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2344-660-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB