Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    22/08/2024, 19:34

General

  • Target

    36e0e2abcbc9d58f75be09be8e602910N.exe

  • Size

    108KB

  • MD5

    36e0e2abcbc9d58f75be09be8e602910

  • SHA1

    9bdb16d1182fdbd2e9ba6b1e1aed2ba72a8ef93a

  • SHA256

    31fd1454c9dcfa04ed0b2b48b99fa17c46af72cdd14f2e2de8629064ae0aac69

  • SHA512

    b51c67d6988a15337ff5a5d462276e61ac74f80a31c7155226dab6cbebe678b9b08fd99f355caf228c0d79d3709cd0d7d209833a123b410780d7a4086209507e

  • SSDEEP

    3072:6pWpUFpEhLfyBtPf50FWkFpPDze/qFsxEhLfyBtPf50FWkFpPDze/qFslEhLfyBR:PqFF2Ie+efsim2QF

Score
9/10

Malware Config

Signatures

  • Renames multiple (2887) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\36e0e2abcbc9d58f75be09be8e602910N.exe
    "C:\Users\Admin\AppData\Local\Temp\36e0e2abcbc9d58f75be09be8e602910N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2104

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

          Filesize

          108KB

          MD5

          d5333768793aa4660f831a654e1d5a73

          SHA1

          8981dcaf76e16c1d660ca06e8cc4f847775aa1be

          SHA256

          8194d3877cdef1c200450e14ff954d68809797a859205e6f5ac5d74e6f19a682

          SHA512

          4fad5753096ddfda1ab02a89a488bfb379c1f33f302e03493a4086d707d0a9d46d0c64135b7e0a1aee7e4067aa543a05fd9e42b949696ed28d364958df297fa6

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          117KB

          MD5

          4dd972d9a6b370d595e752d46d20b0ae

          SHA1

          5c1e3c91a5e4da3ece0274fd2c87a69367e43530

          SHA256

          9da78bc8a82e49fb0a650b85f5d9054cd6e957cd7626af5d95349f1a7c6c58dc

          SHA512

          348b3c0eedc730b4f713511a44b67f9afa078f14280a8f7484678585933f2e2d1642dd44382d5722260413e2bfa93ac4eb77b4684a13fb3ac20da70dea7dbaaa