Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/08/2024, 20:28

General

  • Target

    36666a098639ccefb25fdb2d09fde93c86128552132445d5189a6305e8318d77.exe

  • Size

    39KB

  • MD5

    57f763c6c4bf06633dfa30581b3f99a4

  • SHA1

    abfdfed9b6f6403e8bb30f32127c44ecf3e3d89c

  • SHA256

    36666a098639ccefb25fdb2d09fde93c86128552132445d5189a6305e8318d77

  • SHA512

    8eef37ada69e4e692899fc287aa35d29b9e2b2a43d435acdb8bc074476babc11f1efefa898741d0fcbf97a330a482e17265a3bb3f6e73eb47b7172f0b0fd96f3

  • SSDEEP

    384:yBs7Br5xjL8AgA71Fbhv/FzzwzfIfHLW/l:/7BlpQpARFbhNIV/l

Score
9/10

Malware Config

Signatures

  • Renames multiple (5197) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\36666a098639ccefb25fdb2d09fde93c86128552132445d5189a6305e8318d77.exe
    "C:\Users\Admin\AppData\Local\Temp\36666a098639ccefb25fdb2d09fde93c86128552132445d5189a6305e8318d77.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2412658365-3084825385-3340777666-1000\desktop.ini.tmp

    Filesize

    39KB

    MD5

    b70a4c23a3160f9c83ad9b435a0aef05

    SHA1

    8f93f60b1a3ab7eee695260e96d39f80900a9deb

    SHA256

    b7eb2d03f21bdc89f6f8174b824bc0e1427f472b87b76658a34647d9ec449f24

    SHA512

    c5abb1b703901e2d4fdc36bad7fbfccb3b6bca27cc80a3fb997ef0e6527f0cd30dd6af44b7974900be59febc27665edd010ec0f0137b47d079710baf4c542fff

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    138KB

    MD5

    467353fc5ca17fe9ca0cf7ca4b60a120

    SHA1

    ddd47be4e329ebf24ca68360dded9402ca67db03

    SHA256

    3437e39421eff6fc8aa245ffcdf6877c74b47c3e9c7d336eb02716c22ab65ea3

    SHA512

    ece507d744a9ba5b810262dab0dec6449055eefa883129475443a2f4cfa09b715f854d555ea34ddc22ad32cfdeb06350d08ea20794dd60861d34865258144781

  • memory/4844-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4844-1972-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB