File name:

3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe

Full analysis: https://app.any.run/tasks/e33e5d62-fa9d-41eb-b0d0-14b1c2b2311a
Verdict: Malicious activity
Threats:

LockBit, a ransomware variant, encrypts data on infected machines, demanding a ransom payment for decryption. Used in targeted attacks, It's a significant risk to organizations.

Analysis date: December 14, 2024, 11:47:54
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
auto
lockbit
stealer
ransomware
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
MD5:

EB13533A89DA9762D93DE5D54966DF5F

SHA1:

C0D2CEF9149395218EB3A91AFE6CBBDBF0181C65

SHA256:

3DC6902DC87D976787BDF0878E7174EC526DF613645D3F275E0216D05CF2D217

SSDEEP:

12288:rgnL2oPQoPq2Doa2ieRwN6TPqqXc1lPy+mUP1mjqS9mXishlj8Wsu:epxPZeR66TPFXciMsqSA9su

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • RANSOMWARE has been detected

      • 3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe (PID: 4804)
    • Actions looks like stealing of personal data

      • 3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe (PID: 4804)
    • LOCKBIT has been found (auto)

      • 3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe (PID: 4804)
    • Uses Task Scheduler to run other applications

      • cmd.exe (PID: 4708)
    • Renames files like ransomware

      • 3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe (PID: 4804)
  • SUSPICIOUS

    • Reads the date of Windows installation

      • 3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe (PID: 4804)
    • Reads security settings of Internet Explorer

      • 3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe (PID: 4804)
    • Starts CMD.EXE for commands execution

      • 3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe (PID: 4804)
    • Creates file in the systems drive root

      • 3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe (PID: 4804)
    • Probably fake Windows Update

      • cmd.exe (PID: 4708)
      • schtasks.exe (PID: 1856)
  • INFO

    • Reads the computer name

      • 3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe (PID: 4804)
    • Checks supported languages

      • 3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe (PID: 4804)
    • The process uses the downloaded file

      • 3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe (PID: 4804)
    • Process checks computer location settings

      • 3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe (PID: 4804)
    • Reads the machine GUID from the registry

      • 3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe (PID: 4804)
    • Drops encrypted VBS script (Microsoft Script Encoder)

      • 3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe (PID: 4804)
    • Creates files or folders in the user directory

      • 3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe (PID: 4804)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:10:15 09:41:32+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.39
CodeSize: 484864
InitializedDataSize: 139776
UninitializedDataSize: -
EntryPoint: 0x4cc70
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
121
Monitored processes
4
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start THREAT 3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe cmd.exe no specs conhost.exe no specs schtasks.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1856SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Update ALPHV" /TR "C:\Users\admin\Desktop\3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe" /FC:\Windows\System32\schtasks.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
4652\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4708"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Update ALPHV" /TR "C:\Users\admin\Desktop\3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe" /FC:\Windows\System32\cmd.exe3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
4804"C:\Users\admin\Desktop\3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe" C:\Users\admin\Desktop\3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Total events
836
Read events
836
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
1 156
Text files
0
Unknown types
4

Dropped files

PID
Process
Filename
Type
48043dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exeC:\Program Files\Mozilla Firefox\omni.ja
MD5:
SHA256:
48043dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\ClientCapabilities.jsonbinary
MD5:83842D14351F58E187CAEECEC7EAB0D3
SHA256:488FE7DD390A01BDE343C99C8085FE53EAC52FC0BED42876C18E9F8D79581C49
48043dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\FrequentOfficeUpdateSchedule.xmlbinary
MD5:D4A16C674938F1223A33C75D03164AD9
SHA256:5134601834D60CF342BB317FE980264611A597D9EADC9BC40A550C640CB78494
48043dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\AppVClientIsv.manbinary
MD5:4AF3A5AF4544C8F0DA68C3E51E6AD172
SHA256:D878FD80713645188D16F88107D9AE08B88187BFEE48DDBB0E623237E2D8AB3E
48043dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\SharedPerformance.manbinary
MD5:C8A4B4A85ACBAC64F547703974DFA48C
SHA256:87CA49510DAB4720681DCC9B04B6CA0686E6294CD7B2230E5C141F591DA20CDE
48043dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\C2RHeartbeatConfig.xmlbinary
MD5:063FC07A86E6434D0281332289AA59D0
SHA256:36194C629DDA07DD8C194DFFB0077F4ABF47D8B009DB5A68BC06A82D7D6672AF
48043dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exeC:\Users\admin\AppData\Local\#HowToRecover.txtbinary
MD5:5DB88E0B5A239631C21CF936CF51B127
SHA256:D288F1700505CEBBEB365BA1A16FEA79C44AB9822C7D814B1B35214C0F76C219
48043dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exeC:\Users\admin\AppData\Local\Adobe\Acrobat\DC\AdobeCMapFnt23.lstbinary
MD5:DB173910A9EA4544C8A37AB6BC0687FA
SHA256:0A65C3F756558C32E50FEBB2D46ADB25F107EABDB70FB28A402096EDBFBE7CB7
48043dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\officesvcmgrschedule.xmlbinary
MD5:AC35A7E0CD8F3FD125D4986C638450D2
SHA256:AFBBE48F0DA5776AF9AA48BE5F323C69A950FCDC8A806F892B66A8E863D07CFB
48043dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\AppVClient.manbinary
MD5:8603102E7B1CC5E48734D19B2C32DF31
SHA256:0A1900FA6E2BA57AA6568EB6AF243EC2220000F91361D238D4077C13689CED98
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
28
DNS requests
3
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:137
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
4804
3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe
192.168.100.2:445
whitelisted
4804
3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe
192.168.100.1:445
unknown
3976
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6092
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4804
3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe
192.168.100.198:445
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted
google.com
  • 142.250.185.238
whitelisted

Threats

No threats detected
No debug info