Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-09-2024 22:51

General

  • Target

    136a7700abbcce8c68912fe63727afd7002ff5b071252e008946fe577fce6b4cN.exe

  • Size

    35KB

  • MD5

    aeb0e9f6601ac0de3f72723f7073ca60

  • SHA1

    63b95e409c41505fe5bcd30b58b2aceefda45f9b

  • SHA256

    136a7700abbcce8c68912fe63727afd7002ff5b071252e008946fe577fce6b4c

  • SHA512

    262d63ad94791de0a87df7e03e2c4b8465194cbf3fe697c6746f716c0a671d09880d9cb44c3829f20ce6bb4a59c42b639a9397c83519cf67ff3e3d134bccbf62

  • SSDEEP

    384:GBt7Br5xjLfAgA71FbhvtPcniDvE10vE1ReM:W7BlpDpARFbhH3qeM

Score
9/10

Malware Config

Signatures

  • Renames multiple (3359) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\136a7700abbcce8c68912fe63727afd7002ff5b071252e008946fe577fce6b4cN.exe
    "C:\Users\Admin\AppData\Local\Temp\136a7700abbcce8c68912fe63727afd7002ff5b071252e008946fe577fce6b4cN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2672

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3063565911-2056067323-3330884624-1000\desktop.ini.tmp

    Filesize

    35KB

    MD5

    8b9687bde5bad0c5837a66d9823fd4f6

    SHA1

    c278880c7658ef36d8701066c6100c7bced9debf

    SHA256

    8afc8fead2ba81ec5e0e4637fada94cfea914d4fbfe8460745b6c68db267aa4e

    SHA512

    ced182ea4ebec6764fdc51edc8662f9ca1a528ec824388fdf9764d9cf25a7313103afbe16b8763d594a3b1bca356363262d2d0a51beccd961ac24ebc67b518cc

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    44KB

    MD5

    d10ffbec77edd04f03592af00c017701

    SHA1

    401a0e37e6587515e46e0528ff2500b85819e293

    SHA256

    cd8d3fbcc6f3f37f015772c40c67f1c3308c5da37b5531634cb533e4bca070b1

    SHA512

    0d6dc82a200083627f80f9a4dc47ff08c6a21fe94a96f1e0a446a1c1f4d0d98aa989904ee8420aedfcb6aef594aa6e5f9a518dc559c0f6f17e63571b08d181d9