Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21/08/2024, 13:09

General

  • Target

    3ffe6da5a054ffc646a5d010d0ff9b50N.exe

  • Size

    39KB

  • MD5

    3ffe6da5a054ffc646a5d010d0ff9b50

  • SHA1

    cdec7231c9e5a72fe067d4bc91adbef8fe6ec4b4

  • SHA256

    96c594d5d4eea9a3539da7efa275a2511f94175ea37e769cc5838a553b118eb9

  • SHA512

    7293707f80064c1078753d85b112b18c0f797e2b32809ef01e17251f4151b3b3db100236cece5651b7b6b4b373ab8962cdc5f3fa1369bcdbfe0f3b4af7c7ae81

  • SSDEEP

    384:GBt7Br5xjL7lAgA71Fbhvt342JQuY2JQuv0U0cml:W7Blp9pARFbhjJQWJQOnLml

Score
9/10

Malware Config

Signatures

  • Renames multiple (3366) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ffe6da5a054ffc646a5d010d0ff9b50N.exe
    "C:\Users\Admin\AppData\Local\Temp\3ffe6da5a054ffc646a5d010d0ff9b50N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    40KB

    MD5

    dd184a05e66ec0a69808da01b7d7a3d3

    SHA1

    703212d3505be60a5d83f483e5c640804c153d55

    SHA256

    1c390e78be2e5166dec9b31b0314c50e46d6c9e9bd87ef401b72acd340d1e763

    SHA512

    2d00fd2bebac4df20705ec47c9aa251f912b618188a92541c4b8dce7a041ba0649f660591bc58abf6cfcba0b5c705b17e78cac01978eb7fc8201fe1c2be772d3

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    48KB

    MD5

    3e396359a1cf1bf777c43b4a36ba66f1

    SHA1

    bb72ba637fdc7d9d3594d681edc5c3f937996191

    SHA256

    23f739e093b4289bbc02b98e99cb47c4477d1e4d106a867a960f18b1bcbf8822

    SHA512

    bab93a378dbb0547fbe8258a6b7b3ca4b5107e0191abcac7d6cfe1190f389d650041e0c3b7726642765a1031b69ddb7dad27bdb27e91d6af372267ddbdf7d0c8