Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/08/2024, 09:45

General

  • Target

    f73f5ee13e96ba6e97ba764358ebf950N.exe

  • Size

    68KB

  • MD5

    f73f5ee13e96ba6e97ba764358ebf950

  • SHA1

    ae13964c12443d40ba1a3221c3c69b2ce89931f5

  • SHA256

    df10603abcd5be87ed1a0387cee068c5c9454ac49da2a4cfb0add192915c635b

  • SHA512

    a60b4fbeaeaa2f3074faed956c43394e7d7fde37b403ccbc1a34630684185b33d3e5cab26d382457e88b657c0a072b769487b14f65050da1c00a4a2c40dd7d1a

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZBX5WX5Z4/:+nyi4M34/

Malware Config

Signatures

  • Renames multiple (4370) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f73f5ee13e96ba6e97ba764358ebf950N.exe
    "C:\Users\Admin\AppData\Local\Temp\f73f5ee13e96ba6e97ba764358ebf950N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1912
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1012,i,3861745594156495651,17595114179815238301,262144 --variations-seed-version --mojo-platform-channel-handle=4300 /prefetch:8
    1⤵
      PID:2992

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\$Recycle.Bin\S-1-5-21-2170637797-568393320-3232933035-1000\desktop.ini.tmp

            Filesize

            68KB

            MD5

            c2c638eb893172e6c6935d8ff9def0eb

            SHA1

            ccd1e508b941b50cea65b233799bb706ac97d404

            SHA256

            61954eaa57870a6eb11af469e6d5bd5e39b7f2258d9dafe6e384a8c83160eefc

            SHA512

            0e5a6211da5b05f7fcadafc9cdae6f2b313f237fabf1771c1f7f4b4f2d568ed70fd312300059b5aeba05012b77e591a52167837fe77fe47ec580b7e1294ad5fe

          • C:\Program Files\7-Zip\7-zip.chm.tmp

            Filesize

            180KB

            MD5

            56473fdbe63e47db04a327adbb21a04e

            SHA1

            970e67751e1c75b051934bef380d6efc0e1d708d

            SHA256

            dd709fba858314915de97d2cd3fda6db330994f3d731e91371a9d0a9868b5c3a

            SHA512

            d54cbc461735fff00d68e1da779338480c78dc5364532b64c8c2f73ba9589dad03f356f66fc1cfb51be78974bd15068036720ec232bf624a4f54bf3f768af1fd

          • memory/1912-0-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB

          • memory/1912-866-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB