Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08-10-2024 20:37

General

  • Target

    3f75c3d74a63afa196e6066628816c535e21465bee72c84f6536ba2c53e7054e.exe

  • Size

    51KB

  • MD5

    ae690a3d8289c146bb4d4d539a800cd4

  • SHA1

    85ec269b85921b5417a060322ed05acc9c94305f

  • SHA256

    3f75c3d74a63afa196e6066628816c535e21465bee72c84f6536ba2c53e7054e

  • SHA512

    2aa1deb7aa208d7c5b3deca357ce043a37b904355c95bf4b910fa35fb601a96fb1bfd1ba5512cef05053b2f70473808baa665c9ace081bb988e59d1539e0b735

  • SSDEEP

    768:W7Blp+pARFbhBgnKLMWK9WKD2N2LSarSaXfgT+i1xrfgT+i1xZ:W7Z+pAp2nKLRKIKqoLSarSaXYXYl

Score
9/10

Malware Config

Signatures

  • Renames multiple (3783) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f75c3d74a63afa196e6066628816c535e21465bee72c84f6536ba2c53e7054e.exe
    "C:\Users\Admin\AppData\Local\Temp\3f75c3d74a63afa196e6066628816c535e21465bee72c84f6536ba2c53e7054e.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1846800975-3917212583-2893086201-1000\desktop.ini.tmp

    Filesize

    52KB

    MD5

    82e570506739c2d8f3f19903f3d11cc3

    SHA1

    a1cb0f9d4e3fb1efe48bd708c0a212d0127d6e9a

    SHA256

    7f62d14de4ac61faed6da86ddaec87e8cc57693ee2935af0b96092fa9a700b40

    SHA512

    7bc3956e2cee8e7bc566bbab7ce9a4d50b3fd5bd123bc33486b1ab36e0834e5622b0529a42e9d2cbb27d983a9f189adc747f3b35832c18eef82995408ccc5df6

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    61KB

    MD5

    3a78060324bc60cbbb1b61db883b1792

    SHA1

    ad26358195ac54f3ac5a1e2b66b71bd2452cf68f

    SHA256

    ea6f0eaabe2783bfb97bf5f821ab1a05973d5034ad6dc977e52a1c43d4cfa6e1

    SHA512

    7f4340050e40b548dc74a922e855c5294712b81d5a5d7306a7224de6ee02f34ad8790a9710d6e5863722968ea7753f9ac876c924350a3965d082d64f2710279d