Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01-09-2024 21:22

General

  • Target

    3d4568288c8263931ad8b5ccf54f4882569208e1229e8afb66c5b2b2ff93f0ca.exe

  • Size

    38KB

  • MD5

    554a36726d5f8f537d4e5b626f9c192e

  • SHA1

    fe2e6aeacbb454492524f628686d6794675f620d

  • SHA256

    3d4568288c8263931ad8b5ccf54f4882569208e1229e8afb66c5b2b2ff93f0ca

  • SHA512

    ca40b0aa7a23b25e4f8be743d03cb74e88ad2c7426d4095545e1b5bd3e4f58c25aafa8ac447f44e0792e40d25effcc245e980bf0192fba7b8c8de37361bd16b0

  • SSDEEP

    192:tACUADIY0Br5xjL/FAgAQmP1oynLb22v7b22vZ11F1pN:GBt7Br5xjL9AgA71Fbhv7bhvZ11F1z

Score
9/10

Malware Config

Signatures

  • Renames multiple (3787) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d4568288c8263931ad8b5ccf54f4882569208e1229e8afb66c5b2b2ff93f0ca.exe
    "C:\Users\Admin\AppData\Local\Temp\3d4568288c8263931ad8b5ccf54f4882569208e1229e8afb66c5b2b2ff93f0ca.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2152

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

    Filesize

    38KB

    MD5

    fa0654ea921911d9d8188852928c2fc7

    SHA1

    ea42329a101ea6af8a30a59a31a40a000c30950b

    SHA256

    d8ce7f50d46e4ae4d6083c9795ed7db3a60d5e297df2a8787786282434e31ce4

    SHA512

    bed774d628e216e50f7939f305a9cfb9654753e6d335976aa9e1959ce48481dd3922e961d496c2ee298bf481f5681336508095e98a909b65d76b5018d65e88e9

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    47KB

    MD5

    312cb2c72a18606b138e7b8deb950012

    SHA1

    d50858960ce76ad38c1790852c6ba9212947cb82

    SHA256

    fdd3db5e42109f0103bd3ff35fb61ea8f08139a44dea75042a4b95d6398e06b4

    SHA512

    da886dbf13f17a062d6c8311d6b31b8528c31b3ffdffef8957402f5605272329596bbb9c61e7a1772b935b52b56858b2830e95bc9b5cffd65734461dff51db0e