Analysis

  • max time kernel
    150s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/08/2024, 18:54

General

  • Target

    14601e21d2307e0b2486f99fbb9bda26dd0fc582f63481dbaad54563abaa2f00.exe

  • Size

    88KB

  • MD5

    fbf0411b9eb5860998a9708e26e6d566

  • SHA1

    84c54120c4811a5f5200f7a1517d94378000778a

  • SHA256

    14601e21d2307e0b2486f99fbb9bda26dd0fc582f63481dbaad54563abaa2f00

  • SHA512

    ea5981438c19aeaa4c0e8e3d2a331fd39bb4332812fdfc3f9078a7fb194ceb71c2aa031fcab6abc29c3c40e390d3ca0c5e8fd0a7ae570a2a36841011fdd86fd2

  • SSDEEP

    1536:W7ZhA7pApMaxB4b0CYJ97lEVqNR7Yge+eTdsdYSWYkjk1:6e7WpMaxeb0CYJ97lEYNR73e+eBSW3A1

Score
9/10

Malware Config

Signatures

  • Renames multiple (4863) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\14601e21d2307e0b2486f99fbb9bda26dd0fc582f63481dbaad54563abaa2f00.exe
    "C:\Users\Admin\AppData\Local\Temp\14601e21d2307e0b2486f99fbb9bda26dd0fc582f63481dbaad54563abaa2f00.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4316
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4304,i,8548254608087149642,10333768245962368401,262144 --variations-seed-version --mojo-platform-channel-handle=4156 /prefetch:8
    1⤵
      PID:208

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\$Recycle.Bin\S-1-5-21-2170637797-568393320-3232933035-1000\desktop.ini.tmp

            Filesize

            88KB

            MD5

            e32b7f09b1b21401da955cb60a1e776d

            SHA1

            11d158650904faa828e36bec6750cd37c2924f98

            SHA256

            ed7f8af0e07c9f634f9838e9e13c22d6ceee7b336bbe7d40f4e997433c78a4cd

            SHA512

            b0fd01376a7c007ca5fc594270160dbc88f7b3bcb9d8577bbc09b6100ca42463a8eb1c832635aa7f01e37431538e14fa9c88228096b86c70445749ed9bb51e08

          • C:\Program Files\7-Zip\7-zip.chm.tmp

            Filesize

            200KB

            MD5

            634a0dbefce84950353c12a085f270fe

            SHA1

            5db556dad44dc0d3dde7eb73bb00b2a6a2ff5948

            SHA256

            3e48e328093ee091de4068c9f8d6b1a3148e97279c47b6a61b6d6f1cd246a5ad

            SHA512

            9d436b76311037e0ce3e87dfde87b9382892a9a272240c75e52ac6bc4d23368e79441d1f0c99b12bffa4747b2673addd348720f2b2ba8db500f0a862cbcef2a5