File name:

3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe

Full analysis: https://app.any.run/tasks/e33e5d62-fa9d-41eb-b0d0-14b1c2b2311a
Verdict: Malicious activity
Threats:

LockBit, a ransomware variant, encrypts data on infected machines, demanding a ransom payment for decryption. Used in targeted attacks, It's a significant risk to organizations.

Analysis date: December 14, 2024, 11:47:54
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
auto
lockbit
stealer
ransomware
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
MD5:

EB13533A89DA9762D93DE5D54966DF5F

SHA1:

C0D2CEF9149395218EB3A91AFE6CBBDBF0181C65

SHA256:

3DC6902DC87D976787BDF0878E7174EC526DF613645D3F275E0216D05CF2D217

SSDEEP:

12288:rgnL2oPQoPq2Doa2ieRwN6TPqqXc1lPy+mUP1mjqS9mXishlj8Wsu:epxPZeR66TPFXciMsqSA9su

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • LOCKBIT has been found (auto)

      • 3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe (PID: 4804)
    • Uses Task Scheduler to run other applications

      • cmd.exe (PID: 4708)
    • RANSOMWARE has been detected

      • 3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe (PID: 4804)
    • Actions looks like stealing of personal data

      • 3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe (PID: 4804)
    • Renames files like ransomware

      • 3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe (PID: 4804)
  • SUSPICIOUS

    • Reads the date of Windows installation

      • 3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe (PID: 4804)
    • Reads security settings of Internet Explorer

      • 3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe (PID: 4804)
    • Probably fake Windows Update

      • schtasks.exe (PID: 1856)
      • cmd.exe (PID: 4708)
    • Creates file in the systems drive root

      • 3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe (PID: 4804)
    • Starts CMD.EXE for commands execution

      • 3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe (PID: 4804)
  • INFO

    • Creates files or folders in the user directory

      • 3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe (PID: 4804)
    • Reads the computer name

      • 3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe (PID: 4804)
    • The process uses the downloaded file

      • 3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe (PID: 4804)
    • Checks supported languages

      • 3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe (PID: 4804)
    • Reads the machine GUID from the registry

      • 3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe (PID: 4804)
    • Process checks computer location settings

      • 3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe (PID: 4804)
    • Drops encrypted VBS script (Microsoft Script Encoder)

      • 3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe (PID: 4804)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

Subsystem: Windows GUI
SubsystemVersion: 6
ImageVersion: -
OSVersion: 6
EntryPoint: 0x4cc70
UninitializedDataSize: -
InitializedDataSize: 139776
CodeSize: 484864
LinkerVersion: 14.39
PEType: PE32+
ImageFileCharacteristics: Executable, Large address aware
TimeStamp: 2024:10:15 09:41:32+00:00
MachineType: AMD AMD64
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
121
Monitored processes
4
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start THREAT 3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe cmd.exe no specs conhost.exe no specs schtasks.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
4804"C:\Users\admin\Desktop\3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe" C:\Users\admin\Desktop\3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
4708"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Update ALPHV" /TR "C:\Users\admin\Desktop\3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe" /FC:\Windows\System32\cmd.exe3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
4652\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1856SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Update ALPHV" /TR "C:\Users\admin\Desktop\3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe" /FC:\Windows\System32\schtasks.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
Total events
836
Read events
836
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
1 156
Text files
0
Unknown types
4

Dropped files

PID
Process
Filename
Type
48043dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exeC:\Program Files\Mozilla Firefox\omni.ja
MD5:
SHA256:
48043dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exeC:\Users\admin\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt23.lstbinary
MD5:78B5108B43BC9AFB295B5CF957B37BFB
SHA256:A7C96708C01CEF6ABC071E28E52D39A12F10F50B254307FCA88E802A65EC8E1F
48043dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exeC:\Users\admin\AppData\Local\Adobe\Acrobat\DC\AdobeCMapFnt23.lstbinary
MD5:DB173910A9EA4544C8A37AB6BC0687FA
SHA256:0A65C3F756558C32E50FEBB2D46ADB25F107EABDB70FB28A402096EDBFBE7CB7
48043dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exeC:\Users\admin\AppData\Local\Adobe\Acrobat\DC\AdobeCMapFnt23.lst.[ID-35AEE360].[[email protected]].Sauronbinary
MD5:DB173910A9EA4544C8A37AB6BC0687FA
SHA256:0A65C3F756558C32E50FEBB2D46ADB25F107EABDB70FB28A402096EDBFBE7CB7
48043dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\i640.hashbinary
MD5:474B43281021A2DB604BBBE4D46DD120
SHA256:7A2D91DA4506B5FF1544B755C8068925B3E437C3775BCBF5B0917F0F7DBCAEA2
48043dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\AppVClientIsv.manbinary
MD5:4AF3A5AF4544C8F0DA68C3E51E6AD172
SHA256:D878FD80713645188D16F88107D9AE08B88187BFEE48DDBB0E623237E2D8AB3E
48043dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\officesvcmgrschedule.xmlbinary
MD5:AC35A7E0CD8F3FD125D4986C638450D2
SHA256:AFBBE48F0DA5776AF9AA48BE5F323C69A950FCDC8A806F892B66A8E863D07CFB
48043dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\ServiceWatcherSchedule.xmlbinary
MD5:01B1C00297C2A4946D84048B06BE2F5C
SHA256:2EF7BE18AFF9230FAABBDD6DAD3B83C0BDFACC9CABD9AF0124EF437C35A26844
48043dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\AppVClient.manbinary
MD5:8603102E7B1CC5E48734D19B2C32DF31
SHA256:0A1900FA6E2BA57AA6568EB6AF243EC2220000F91361D238D4077C13689CED98
48043dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\i640.cab.catbinary
MD5:3FFCDABB550497EDFF891B79541EAAB9
SHA256:88CE1E2A0A05C1FBC956862EEE50B81D282813AFDD99CFDDDDE2A32A4C90D0A4
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
28
DNS requests
3
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:137
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
4804
3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe
192.168.100.2:445
whitelisted
4804
3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe
192.168.100.1:445
unknown
3976
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6092
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4804
3dc6902dc87d976787bdf0878e7174ec526df613645d3f275e0216d05cf2d217.exe
192.168.100.198:445
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted
google.com
  • 142.250.185.238
whitelisted

Threats

No threats detected
No debug info