Analysis

  • max time kernel
    150s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/08/2024, 21:53

General

  • Target

    5cc15f776ac1a65b4dab7fef67a76806d0226bfd7a87d69dfc4b279e4fa1712d.exe

  • Size

    38KB

  • MD5

    c7c2d3ac5010f13d047432f3b99842fa

  • SHA1

    a90f8082829ecff6f2c212188ea6802cead9b184

  • SHA256

    5cc15f776ac1a65b4dab7fef67a76806d0226bfd7a87d69dfc4b279e4fa1712d

  • SHA512

    656949839c1c503fba5b5ec058acd93f4de79cba5921e0a0bfec2e59645054522eb69f49a83bb1a10916d57558f149c6158dc65aab590959214e19fada20ae0b

  • SSDEEP

    384:GBt7Br5xjLdbAAgA71FbhvU8g0U0fL+8t8YwTZJj:W7Blp+pARFbhBgnKL+8t8NZJ

Score
9/10

Malware Config

Signatures

  • Renames multiple (5059) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5cc15f776ac1a65b4dab7fef67a76806d0226bfd7a87d69dfc4b279e4fa1712d.exe
    "C:\Users\Admin\AppData\Local\Temp\5cc15f776ac1a65b4dab7fef67a76806d0226bfd7a87d69dfc4b279e4fa1712d.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4428
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4316,i,10065386245627775856,6567048529106473151,262144 --variations-seed-version --mojo-platform-channel-handle=4280 /prefetch:8
    1⤵
      PID:3172

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\$Recycle.Bin\S-1-5-21-2170637797-568393320-3232933035-1000\desktop.ini.tmp

            Filesize

            38KB

            MD5

            4d2adabd8aa284528027bc7e63bd576e

            SHA1

            46d85e70bd9032726f6ca292847bd7c1a992b2ff

            SHA256

            150d04db943dab58ca3cf87dd464663d663148a76d0b28de1db51c37d5f693f5

            SHA512

            a3b4431d302d2a18c57458e55bf7bef1ed0ccb4778ac25c0ee832b4982f0365b87b0f387bc266857fe0ca66f0d679e1e7c3bdf74e8ca7f5bf23032d55c82f4f7

          • C:\Program Files\7-Zip\7-zip.chm.tmp

            Filesize

            150KB

            MD5

            b0e7b4a245f97d01330a575e6166c00a

            SHA1

            f98b544c306a9938b5d4fbec6cce2adfc93135ae

            SHA256

            6bbdd014b5ed4b6103c86429ca08d6ba576a0c74305a676204fd1618061a2221

            SHA512

            b32f69779287b90e76dba77b56eb3081118c878fe779d9327117fb27ae83f0d759c882511bcebaaa1fc1610e50651df9afe1fadd9a078203e0d8ea1a1c0d97b4