Analysis

  • max time kernel
    120s
  • max time network
    22s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    03-08-2024 02:28

General

  • Target

    3857195225483ecde583a58a46435a20N.exe

  • Size

    38KB

  • MD5

    3857195225483ecde583a58a46435a20

  • SHA1

    44121a76996be7ff30fb29022624417fbf16a6b6

  • SHA256

    0e482d99ff551dbfe591eb88e94e4656702d121a4dcdc2a5de7de76b30e551cf

  • SHA512

    b5ccaae3a5d9c2b0e2e7fb5cd422997749a1db916f1d2881af7bc393a891835f67ce451676c2e4823dca59582d5da9e273763c379318e5f2f4d05a5e608e052f

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfproFNFjqAJLOqAJLg:W7ZppApBULcfpHLcfpyDb

Score
9/10

Malware Config

Signatures

  • Renames multiple (3315) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3857195225483ecde583a58a46435a20N.exe
    "C:\Users\Admin\AppData\Local\Temp\3857195225483ecde583a58a46435a20N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2224

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini.tmp

    Filesize

    39KB

    MD5

    f884a3125d824b044acf7bd5179e98cb

    SHA1

    1d813290a61b502ffb71b5125e6954f82b48174e

    SHA256

    c1948ea654612fe238878e4f69bbb987340690902316c8446cd8369a6ffee5ba

    SHA512

    ff37ef1d4b1f2cc2dbd4b8b6b1f2b81ef9161631c5aa7eb9a5f9b6b57971dc41bb3feccdfb86bd3764e84ced5fea8f79d86777640a60934932ef253ee7895482

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    47KB

    MD5

    c47e2d5b95a6c46ab801d998c99def94

    SHA1

    7227aead30b13569c84fddf0960dfbac7d5b8be8

    SHA256

    6dbd63575b0d279b24e403f25ad50c039976a23a321a3d987318324c4f33dfa5

    SHA512

    3e63c5e0236f09396250fab3c1f5d1e8c2480d7158e10d8ed1b72c92f4143e9d4aec55e6cf66a1caeaa81354d6dd69caaed90df08a5b9c81fbef6e109d0dbff1