Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    24/07/2024, 02:30

General

  • Target

    3b0001e34a5347dff55e9803f786e4f0N.exe

  • Size

    77KB

  • MD5

    3b0001e34a5347dff55e9803f786e4f0

  • SHA1

    b3acba17e706bdfb056980fde443e2b8c06dbd3a

  • SHA256

    cc95ec3c4afb75496b6c812a31a24cf1939ca284403fcafeaaef8f77a0b0ffb9

  • SHA512

    43807ab0aba5d83f6aa3450fbbfdf94c14c250ed52c9005f4fa880a4e253633b42349bd27a41f34544ea7a9d58d4f4756425bf376d319d9a00e52186dd56ed19

  • SSDEEP

    1536:W7Z+pApfGQ3y3RWvfmRfm9sKsSd5GT6S/:6+WpDfmRfmh2Tx

Score
9/10

Malware Config

Signatures

  • Renames multiple (3107) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b0001e34a5347dff55e9803f786e4f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\3b0001e34a5347dff55e9803f786e4f0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2304

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    77KB

    MD5

    5df2e3df9696b6d58627d206ff4f6212

    SHA1

    55534b2c4105e41ef5f4dea17abc0fb2bea07f00

    SHA256

    dd35690a8780145962be8b5fce002c438111612c3f03f47e9a19b33710367fcb

    SHA512

    0826cc6551598d31778818e5caac6860237cbebc598e5d7cc02ab0157792e7ba9057cf0de24f396fdcbbd5efdf09a4433efa664b41978454d1288a9be22d1d41

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    86KB

    MD5

    9fe48e90ee3aadb7348080f596818ce7

    SHA1

    e993ad03eafcb2ce4091ec3c6459908c94d16e39

    SHA256

    fd6a5532e88b188faa54e39c1ec06d8938e6997f5cc5504abe588427e9be0d53

    SHA512

    0e5e978d65efa580165cf24bdc31f05632900fe07a51a47cf3593a28d8f5dbe45a9cae6ceccd8dcc2eb764b90e7875eaae383900a32e0470c7be6ea758191210