Analysis

  • max time kernel
    150s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/08/2024, 01:46

General

  • Target

    f657b995a02837a6ef314902fe88d0f5612b2b6b0fe5a3b4d86e00daa03a2d88.exe

  • Size

    63KB

  • MD5

    83d4a7f9fdbddf45f24a5bce14db5367

  • SHA1

    207e456e43f55f1588ba9d5f1f8ede85fce739b8

  • SHA256

    f657b995a02837a6ef314902fe88d0f5612b2b6b0fe5a3b4d86e00daa03a2d88

  • SHA512

    563a0227759fb9df6e6853030f52d84b7818e540599d1390f10a5cdd16e34e841c2050eccfcd33f92e26f5efcd603f0a28af463cf011894e14eff15a715d6a41

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfpVF/MF/3Nw/Nwk0cEMdV8IEMdV85/gzd:W7ZppApBULcfpHLcfpX2/Nw/Nwmx9

Score
9/10

Malware Config

Signatures

  • Renames multiple (5036) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f657b995a02837a6ef314902fe88d0f5612b2b6b0fe5a3b4d86e00daa03a2d88.exe
    "C:\Users\Admin\AppData\Local\Temp\f657b995a02837a6ef314902fe88d0f5612b2b6b0fe5a3b4d86e00daa03a2d88.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:348
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4340,i,1729213506309163284,12809566808978835441,262144 --variations-seed-version --mojo-platform-channel-handle=4288 /prefetch:8
    1⤵
      PID:1864

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-2170637797-568393320-3232933035-1000\desktop.ini.tmp

      Filesize

      63KB

      MD5

      b1f85a9a7fb72255caf21049ad903904

      SHA1

      f55e5865f57c2135b5f8d21215d9f606aef04c62

      SHA256

      b7421a552ab411c415afa8725b46ebfea40736cb4959698e06cb14bda3ff193a

      SHA512

      f3e25de8a83ec1739ab6ab4eda3eefa0474ca03efd2dba9a254f4f58b6f035ba6855e514e2e8c481c595407b3364b3e7579be87bd9424a94e4b09413984e97ce

    • C:\Program Files\7-Zip\7-zip.chm.tmp

      Filesize

      175KB

      MD5

      990830b514258f81471a803198a86a3b

      SHA1

      5229ab6a50f71b8be3db4094d7412693af6bfbdc

      SHA256

      ead4d2a1a1505b5a27dfd265589732f118022c5157debd538f719c720b275a11

      SHA512

      f6448ccf3a9061de6d3a4f5f2722204eea584a5eb2f2a330ba28a63cdcae6181cbc0f80ede3adf0c83fdd185e64924a25e19f399dd7867ac68cd016c36074ccf