Analysis

  • max time kernel
    150s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/08/2024, 22:25

General

  • Target

    684b4d5aba8eab2a5019beb2e9aa7bc1a91d69478ce9fc985b63c03f6fda39c7.exe

  • Size

    42KB

  • MD5

    2c24beaa58c93997392b97f20c350c54

  • SHA1

    dabafd998a67df8779b6f7fb043f94d2c89dc5ee

  • SHA256

    684b4d5aba8eab2a5019beb2e9aa7bc1a91d69478ce9fc985b63c03f6fda39c7

  • SHA512

    ade4867f35d269ba746bc484b6021fc94e031f9679d6de21b003d4f6cb67c0aec67751b4b38315e0ca920ce65a0028ec7dccdf6127da3446a1ea88634ed6f733

  • SSDEEP

    384:GBt7Br5xjL9A7AgA71Fbhvnqj7jU7ubTAgpbuvx10AaIdKB7ubTAgpbuvx10AaI/:W7BlphA7pARFbhL801VvM801Vvv7cYl

Score
9/10

Malware Config

Signatures

  • Renames multiple (5129) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\684b4d5aba8eab2a5019beb2e9aa7bc1a91d69478ce9fc985b63c03f6fda39c7.exe
    "C:\Users\Admin\AppData\Local\Temp\684b4d5aba8eab2a5019beb2e9aa7bc1a91d69478ce9fc985b63c03f6fda39c7.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3924
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1296,i,1602949858158667699,12464335823361976127,262144 --variations-seed-version --mojo-platform-channel-handle=4296 /prefetch:8
    1⤵
      PID:2240

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-2170637797-568393320-3232933035-1000\desktop.ini.tmp

      Filesize

      42KB

      MD5

      1cd10e8c37b04eda8ff31746d8517c50

      SHA1

      19d96c94945c6e835680df35117581eb0e13b78a

      SHA256

      64123fe6420cb5e26a003ff1c9d797951093c8cc4e0f151ceffa63cd1132ae75

      SHA512

      8da8bd95242730a38e37bb6ab90b1d169b3837a7f76881bb69aaee00a59dc52104913e8823d41e36909b28fb28d64bedc7692dd2d7dcb21fe75741356f9b6ffd

    • C:\Program Files\7-Zip\7-zip.chm.tmp

      Filesize

      154KB

      MD5

      42b9d851a2d725a2214cb2e801a1ec84

      SHA1

      534fa3d64ced002b41efa08c5991d7dccf946421

      SHA256

      6bc50e10c3c64ae00790a6a09dc9d31d1282ee4e4b38df9a201d9959f75f66b9

      SHA512

      6a44cf141b1509c9207a6b8ce4b5b2bc10d69bedcb77b925eaefd51b72d58f83b03791e82eeeb95116d1e08355ae6ea2f733cc8a67b9c31a6e80e3318530ae97