Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2024 20:08

General

  • Target

    3f7104db39b4fd8d1a6d21e38d0dcfd6d063c38cf2439065029989952d918acf.exe

  • Size

    50KB

  • MD5

    5c3722d6fda1e7fabd24aac29a4649b4

  • SHA1

    9016a62310dfd6547e3cf659f84c23343eabc0d5

  • SHA256

    3f7104db39b4fd8d1a6d21e38d0dcfd6d063c38cf2439065029989952d918acf

  • SHA512

    7555dfe32770511010b81e7f0e8ff2579d36218937fef1d68aef12b770d8f03d26b729b6318095af906847072dbfff35a8dfd1db8bd11e50019b3e20052094bd

  • SSDEEP

    768:W7BlphA7dASbSjJJcbQbf1Oti1JGBQOOiQJhATBWvyBh85c52r3:W7ZhA7dABJJZENTBWv36cr3

Score
9/10

Malware Config

Signatures

  • Renames multiple (3759) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f7104db39b4fd8d1a6d21e38d0dcfd6d063c38cf2439065029989952d918acf.exe
    "C:\Users\Admin\AppData\Local\Temp\3f7104db39b4fd8d1a6d21e38d0dcfd6d063c38cf2439065029989952d918acf.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    50KB

    MD5

    7e586cfd767b3b833a9a677f117b798d

    SHA1

    0ca55ecd2a9d2dbb6392cea2306724f14ec561a4

    SHA256

    af48db68653265408541b81778a7b92bf6cc1be31b1c38374501bfa6401c5182

    SHA512

    b7b60fdb3a20cb37743fa516b6a57fd9093660c94e90a3cacb34cbd16b3d226b9615f3198573c8a2e78eda64a5e1cc818cc8a874b1786ec38149e4e45a095670

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    59KB

    MD5

    670d6f230d6b3132bd24335138d2ee16

    SHA1

    8942cace668b3087a554f4cdb467b58b9ea0871f

    SHA256

    e4ceca457a59a8228291d8eddb75b0dfbab986b455389496a7dfc1ff8ae1add1

    SHA512

    3a70075967980ffed60e58b76c0c258fc19ef6b4b47d7b5b8d93a59e5faace664edef2e1a9e22aa8ed07074f3cb00cdb65f1a1376c248587af63c6eb1924f157