Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2024, 21:19

General

  • Target

    3cb1d7d0787db1e81cca16cf42c99780N.exe

  • Size

    46KB

  • MD5

    3cb1d7d0787db1e81cca16cf42c99780

  • SHA1

    2788aa8329f8fb9a7ab2836a50be1ffdca768d43

  • SHA256

    eec0e04b8c11c698adea1b0b066101a8e419a2c813afef5929ca477185956af1

  • SHA512

    d6b69fbe2e01d0f5f7f79b579c6b456b32077e1ff3de867fef1a59dd59e7d91857217a00ce15773044bf6ff511c2e33613d9e05367671be965ac043a5ba36886

  • SSDEEP

    384:GBt7Br5xjL9AgA71FbhvuNBN10wpAp/lvolGClvolGwTCus7sczBywY:W7BlpppARFbhbt7Y7wTCnBI

Score
9/10

Malware Config

Signatures

  • Renames multiple (3266) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3cb1d7d0787db1e81cca16cf42c99780N.exe
    "C:\Users\Admin\AppData\Local\Temp\3cb1d7d0787db1e81cca16cf42c99780N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1672

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

          Filesize

          46KB

          MD5

          8fd7f889e5dcb05d76a13121bd3b8b0f

          SHA1

          28af072b9ce33dd2e917825485d1bb8eb669b580

          SHA256

          7b70e1f3e4e82bedeeb477ae47f588283214267c3879a35a3ce658ab0c962bd1

          SHA512

          685c4d433e38c52ba311251692f1546dc7664f145701cfaca5649f649ad4f3cb70911f9a528b069518e88f1a636e86ec7f2b670e0a44496667969bd7c8f29742

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          55KB

          MD5

          6e1744d81e4a76386e8489d677c4ce13

          SHA1

          193dfacc8e11568f4c95b6a20da479508cbaf7a7

          SHA256

          41eb42f22d33abde69b5d8c3adbe622526b2bed8575dc33fd981251e7f644b70

          SHA512

          71a32ba50d9e673f0f31de531f981576eb09e93721195a6ca43eabe8019087c33805528c2c6c12b72c40f0941ea60c1c56c8bb4a408f528805a66571f4709ce8