Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2024, 04:25

General

  • Target

    236731f0e06533c914cdb4cefde03140N.exe

  • Size

    79KB

  • MD5

    236731f0e06533c914cdb4cefde03140

  • SHA1

    8146384fbfd9a66fafffb64c90626d7567b20bb4

  • SHA256

    0d5b4168a5e4abe71a8f34e904300c87ccd5510520faa6674081908ede2d95af

  • SHA512

    ebe7cea5d19b748f815faf6d591c811e65173d8af3e51ddd6da24e8be9f60ea77bb26d21a15f368b9c468deaf99a54a956f7fbee826adcc0da4756933f7ba5af

  • SSDEEP

    1536:W7ZDpApYbVK4vx4PN54PN4OHepOHeZSF79:6DWp7Wf

Score
9/10

Malware Config

Signatures

  • Renames multiple (3181) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\236731f0e06533c914cdb4cefde03140N.exe
    "C:\Users\Admin\AppData\Local\Temp\236731f0e06533c914cdb4cefde03140N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2420

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

    Filesize

    79KB

    MD5

    1c3b42ecf47bca092ee6d4f36e0448c1

    SHA1

    26a3a630738e77bfd0ee60e9d80b4ecf9c44c7d9

    SHA256

    bcd620b3065d3b18eb0c50f4487d278d8ad375b7c1021680fd39b10d7f8c5770

    SHA512

    f1b0bb0d15ee427b6ad06eb5f21782ac6cb8df4ac8e461ac6299b98f690a48405e39af5f9459d2290817979ed7db70a4ffc71d1b1d0ead4a0513d88d149cd8e9

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    88KB

    MD5

    bb9eacd4eaf00eefc50d381c740e1b05

    SHA1

    1c9a9ee187f849e8a0485db1cf4a2ae49cc1341b

    SHA256

    f97a2f0095ac7b566c0f629893d009a185f3556ad6761edeea959ce9508761eb

    SHA512

    e1aae92fdb26d900540154c77e5f12c2aed45adcdc822ab0316e7b4f71ed9bc08a820ff2d123545ac73b4f89dec671c8e2778b24973ecc7dc985ed0a026fe799