Analysis

  • max time kernel
    150s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/08/2024, 22:16

General

  • Target

    71f249630f1b263db81d57ed8ed32e1dadf1534de6978953aef1e864d44be1cd.exe

  • Size

    77KB

  • MD5

    4339074e11491136ab1939c7ef8339fa

  • SHA1

    1387bd7cbf2db4417d6f32d69478e18afdfd2c06

  • SHA256

    71f249630f1b263db81d57ed8ed32e1dadf1534de6978953aef1e864d44be1cd

  • SHA512

    9e14a2474dd3b4bc3c7abbb6b8c10bd9de2e8413742a63f23f07521edba9936190460b6fa788048c094a266d3620bc2e4bee2d77654975122e6892587967d232

  • SSDEEP

    1536:W7ZhA7pApvOsOKM4HBhaGwOQ54xEIjlfM:6e7WpRaSljZM

Score
9/10

Malware Config

Signatures

  • Renames multiple (4880) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\71f249630f1b263db81d57ed8ed32e1dadf1534de6978953aef1e864d44be1cd.exe
    "C:\Users\Admin\AppData\Local\Temp\71f249630f1b263db81d57ed8ed32e1dadf1534de6978953aef1e864d44be1cd.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3400
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4208,i,6510295916244954942,10164894160290787457,262144 --variations-seed-version --mojo-platform-channel-handle=3824 /prefetch:8
    1⤵
      PID:5016

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\$Recycle.Bin\S-1-5-21-2170637797-568393320-3232933035-1000\desktop.ini.tmp

            Filesize

            77KB

            MD5

            2715ae24b02f4b70b9d5c21af3cb430a

            SHA1

            129aa1ac1610b4ee7d38babb5d4105bfce8e7f27

            SHA256

            a0b5b057a24014a0efc6f177df5a62881a82668fb2616c92f5178044b4888f11

            SHA512

            ff3b6815bf151ed9f40d52d616edf9176fe23120858322d87be1fc0e6de6ac6b4df2a36d3934fce61b711912201c91fcd59683bf85017e4946f14298e15c4c62

          • C:\Program Files\7-Zip\7-zip.chm.tmp

            Filesize

            189KB

            MD5

            708868af85efcbd4a48b782ce4cab157

            SHA1

            68d6224dfa1565063fb8b7c1fe610419dc5cc2bc

            SHA256

            c1e305d1b87c9d163e8de023e2cb73c4e3d06ef752c8d0672db500d0d8f8a9aa

            SHA512

            25a429cdf11cce3b89f071eec04197e4dcc68e1af191b85db2861693b3d24b167ba2b485443f7b31341ee1c85ff38ad40a870157d732ada2da8bd224785df712