Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    24/07/2024, 02:41

General

  • Target

    3c516ddce9f8ed90181a51541dcca150N.exe

  • Size

    70KB

  • MD5

    3c516ddce9f8ed90181a51541dcca150

  • SHA1

    e3a06f2695278897d09cd047033554c831a8eb5c

  • SHA256

    1f1c39128fefcec64b693a4620f4c86bd1f1a10607686a2c0ec9a672de414e6b

  • SHA512

    3d095b5b5b79c71a18a3599859e62141c596c83640316b7a00af857a98fe920fc7d2a0f996c714e5a879d2f26b8559ffdead435b6ce0cb4a7c27f7ae7f573194

  • SSDEEP

    768:W7BlpNLpARFbhblkYlkuvIYFWcDYcDlvcYNnVvcYNnnUBRoRt3v:W7ZNLpApCZuvIYYoYoN7n97nmRoR9

Score
9/10

Malware Config

Signatures

  • Renames multiple (3092) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c516ddce9f8ed90181a51541dcca150N.exe
    "C:\Users\Admin\AppData\Local\Temp\3c516ddce9f8ed90181a51541dcca150N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

    Filesize

    70KB

    MD5

    ce49bdbc8485f76fd0f3fbebf947e534

    SHA1

    8584a933871b998aae2486f0b9a6c0ac1a1feb44

    SHA256

    7b4333e6e5103c38b8a13e1738b6725fb19f250f2fedeecee5f0a019ac21b2b5

    SHA512

    97c3673e5d125e02e023f8790f3f0e242780e57aa74f5c43e23e599e756ce35c676bb05aa0e17eaf6fb7c0cdb0992f32113a5f9f9e83f56b54477911b78632d9

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    79KB

    MD5

    c0171bc5f27271b8fe35a9447f78df84

    SHA1

    9bf056423027ea2d97f800b644fdf9d828ab64a9

    SHA256

    0623db3be066b8edd3facff33d9f7bdbb5fe0e907c6502a29b5a3159a4ba3e0d

    SHA512

    cf42309bd97b0f3a85463e4c8bfcaf62b08112cb8591750250ac97c35f121246540e6a6bed5885d549bdaa762f99484d139b9a8ef82916637832c08eca1c8cce