Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13-09-2024 01:58

General

  • Target

    c3870f283a48fd534db6ed144d9691f2ba3f0f5d8c0bb16c9927b31b84d1d27d.exe

  • Size

    46KB

  • MD5

    72da1deec448f089f200135bbd265cec

  • SHA1

    33e8f6e1c8fda431f772d43959bd2348314d693f

  • SHA256

    c3870f283a48fd534db6ed144d9691f2ba3f0f5d8c0bb16c9927b31b84d1d27d

  • SHA512

    a377c6913db7597a1ca61e120f20489783009fb760d189924f98bc6eb70fb7a0ca17f3e75f4bea56a99062b6158b85c985811e0d55bd9b0d26cc32ca539af220

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfproFNFjqAJLOqAJLcX4pNX4pB:W7ZppApBULcfpHLcfpyDgpupB

Score
9/10

Malware Config

Signatures

  • Renames multiple (3440) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c3870f283a48fd534db6ed144d9691f2ba3f0f5d8c0bb16c9927b31b84d1d27d.exe
    "C:\Users\Admin\AppData\Local\Temp\c3870f283a48fd534db6ed144d9691f2ba3f0f5d8c0bb16c9927b31b84d1d27d.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3290804112-2823094203-3137964600-1000\desktop.ini.tmp

    Filesize

    46KB

    MD5

    1d031c613e275701e4add258a462d3b5

    SHA1

    91b762ea93d1b14659d61b82c7c773068a161b8c

    SHA256

    b9c1dfafa38f581a35a6e88b249ea71ed54ea64b931483fa56fe512bccd8d07f

    SHA512

    07c9ced157078de20644f48b380e322737bc2d19dc524a5c6974b165fdf6ca0c5536a88f13f872c509e03686cb2822b81a47773f23bfaafd39731f97494c1d5e

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    55KB

    MD5

    25cd5c8be16e24c0a3c99607dfcca725

    SHA1

    08580b0490536c1a5d61c7fb353bb3563a6f5cec

    SHA256

    9150a97910e79e1e0d84de9d57d6de2d641138e1d3a8d26a3a8a786683a859c6

    SHA512

    8b2238cfd0bf1f4f7ab946deacd3aff3e0f824045128add8170e0dcac51de87069b34e3304550cd682d74ccd5c28fa8c3ea1f89461974e91d955b36044073bc5