Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04-09-2024 04:04

General

  • Target

    c3715eca0aab0646f53828774afc3d662914a5376dd0f5f27ae1fae2150f0bab.exe

  • Size

    76KB

  • MD5

    dab47f315ea89dd67cdd7cb261287a53

  • SHA1

    3b3e7bb10ba4b0a6ee81d01032c2841136c783a7

  • SHA256

    c3715eca0aab0646f53828774afc3d662914a5376dd0f5f27ae1fae2150f0bab

  • SHA512

    8f811545e2d649465cf38a74d78311e27bd3483103da846c43024558690f6229cd3e6c7ebcf07882c07d4539c83ce379ae2238b242d3bd3c3a3125c2959a0f01

  • SSDEEP

    384:GBt7Br5xjL9A7AgA71FbhvnwR/s4NW2sl4c3KbsvrTgOzkJAopyVFlgLfQf+PZfH:W7BlphA7pARFbhM0KW2s9B4hofAP

Score
9/10

Malware Config

Signatures

  • Renames multiple (3508) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c3715eca0aab0646f53828774afc3d662914a5376dd0f5f27ae1fae2150f0bab.exe
    "C:\Users\Admin\AppData\Local\Temp\c3715eca0aab0646f53828774afc3d662914a5376dd0f5f27ae1fae2150f0bab.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3533259084-2542256011-65585152-1000\desktop.ini.tmp

    Filesize

    76KB

    MD5

    99d355d512be856a9bb77bc9eabe5f52

    SHA1

    5550209d2d3d9643eba24be969a6a95e70d4ca03

    SHA256

    edd661b195e9ded538c8b6d3a59799d728f7e170a3afd1c5e973c31a4b58e071

    SHA512

    1139814995c27b267dee2bae087c35efc8995c98268bebdf580dd2735470cbd83d859e290e1ea24ff12071b54587ced5b181b1826835f0809a59ad316d28b40c

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    85KB

    MD5

    cef53c1a3c25b0e13f244ea3aea495d3

    SHA1

    1bb4ef5833afb183cfd2aa4d6bbfd88d85006bcf

    SHA256

    5091ef1c262a95ac3d4dc431b3c104944daee14f8f4cd3a6f3f009136efb3b3d

    SHA512

    a6246f9e50dd8af9a483a186b6bf1339afd839ded21bd8afceee7160029c138d4f5f8dc518664cbee58f2015e883422dc0ae41fad63354e618d423fd2101a6c8