Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26-08-2024 01:58

General

  • Target

    b36d74edef9f83e84c3cdd1f6ebdf06f8841278614fdaed42b66cfffc6fbc0bf.exe

  • Size

    45KB

  • MD5

    86b646495f842f55298cec9223feef6d

  • SHA1

    3af4e40a763cd27632906e45591508ec5938ed38

  • SHA256

    b36d74edef9f83e84c3cdd1f6ebdf06f8841278614fdaed42b66cfffc6fbc0bf

  • SHA512

    9ee68a7b0b13122e02cd82d0eb311817f9a4372d32db57964f858899466bacb8068fe3e7c41a1438d0d369a59064bf217788953eaa288dbbcbc447ed50ede6a3

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LOl6Sl5lsSccy/Gum/GuZ:W7ZhA7pApM21LOA1LOl6vSccd

Score
9/10

Malware Config

Signatures

  • Renames multiple (3745) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b36d74edef9f83e84c3cdd1f6ebdf06f8841278614fdaed42b66cfffc6fbc0bf.exe
    "C:\Users\Admin\AppData\Local\Temp\b36d74edef9f83e84c3cdd1f6ebdf06f8841278614fdaed42b66cfffc6fbc0bf.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    45KB

    MD5

    ed084a8193fa5c97f9fb1aad4f3c09b4

    SHA1

    c542fae497a73fc78528e1c5ad0930c61008e94b

    SHA256

    df267831be3952c8ab41bc22447dad7f1e6c0545c3e6845939498035c339eda9

    SHA512

    5691fd9065af9eb5e7beb35487b51dbff4e360bd6e9a5728811d07750f488bbc4378fa1f728eed78c5ce95cc5c8ade042e88ff11d345598e2953cb2e7987f282

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    54KB

    MD5

    5514a0e7875f8cbb414ae076f94abd98

    SHA1

    d34e6d0b75b42dfefbcc8a23ce21a3b742f66be3

    SHA256

    048ba1b6e1eeffedd4f79480647b601160228698edb566b499944f7187aa6411

    SHA512

    96b03c0da189a94d5abdc770195eaf6223f548316d5ce538985fb34b285122b7de9dd89181cba583e1c7f91e5da0c9ab4a40fa453c339f479bb81e5a7c5b002e