Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-08-2024 03:07

General

  • Target

    3f4cdadb5794e3b211fc2f5c678b5a40N.exe

  • Size

    127KB

  • MD5

    3f4cdadb5794e3b211fc2f5c678b5a40

  • SHA1

    59c7d0eaac98a416185baeb306df8541c3a226a2

  • SHA256

    3525a016752e7e923e2727d351a41cac3d050b7ac86fb5da42a3dd5331c2aa0d

  • SHA512

    d8543f185ee01a457b4a4aaac2bd5e495707de2133371594529ce64ed1c0207e49d6d848637a30c2b6dfcea288d55e3f28a6d16c10f35dc755d489d5951e8b54

  • SSDEEP

    1536:V7Zf/FAxTWxOmO/fxRfxykK3ZUkK3ZKYF6HTW8OmO/fxRfxykK3ZUkK3ZKYF60:fny+Tuf7fs6eTuf7fs6x

Malware Config

Signatures

  • Renames multiple (4102) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f4cdadb5794e3b211fc2f5c678b5a40N.exe
    "C:\Users\Admin\AppData\Local\Temp\3f4cdadb5794e3b211fc2f5c678b5a40N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1504
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4120,i,1729213506309163284,12809566808978835441,262144 --variations-seed-version --mojo-platform-channel-handle=4440 /prefetch:8
    1⤵
      PID:2396

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-2170637797-568393320-3232933035-1000\desktop.ini.tmp

      Filesize

      128KB

      MD5

      5fec5203415b4191293f2d86c4b6dd99

      SHA1

      87e7a7c291e70b6d94c7feafb56ce46f0502fa17

      SHA256

      0354fe14ea3465bf6138ab1b23a506ce089d5e683f1591875c2fb0581ab1adf9

      SHA512

      d2c6fede23c4067e88b0a58f52f54c9aa64e7936e8effd337d0daef13468aef990c1f5a33ce47f48b92b511ba400e51128b4066be475346b1199383b78a729b2

    • C:\Program Files\7-Zip\7-zip.chm.tmp

      Filesize

      240KB

      MD5

      645f9f0d22c9bf17dd054398f4745888

      SHA1

      89411b7586128aa89245b54cf1fb6ff7707c602d

      SHA256

      1643044f60771b04b57911fa947dfd6f5fdab2b508f21b73b006129a61e31f64

      SHA512

      73ace148fd700857535b533442982485a0c0a93d673cfbf4c88890c9376275206a5a365eeac42fbbf32a2f328146192fed03b8a307192382f4a617bf1db86f74

    • memory/1504-0-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/1504-1610-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB