Analysis

  • max time kernel
    150s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/08/2024, 04:08

General

  • Target

    bdce59ea66b3e2f5a1cc7e962604c3ffe2809e14367958d896ad7bbe60244007.exe

  • Size

    44KB

  • MD5

    a9e5bb8196920c2d0dc2b370cb693f33

  • SHA1

    40327f9447c8f50168b0691147415b863cd44f26

  • SHA256

    bdce59ea66b3e2f5a1cc7e962604c3ffe2809e14367958d896ad7bbe60244007

  • SHA512

    aa2684711fc382238c5b4c813421f2d82752e3f0f6d2ba0bee087894e68d7b0da9e9658ce037f3b3d7a0986b23a8c80dbe578c2e98de9a051ceeb05d1dea190e

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LOHwOoJVO7iJKqOxiJRDOWiJ4JOAiJ/rOqiJI:W7ZhA7pApM21LOA1LO2c6b25gc6b25uO

Score
9/10

Malware Config

Signatures

  • Renames multiple (5031) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bdce59ea66b3e2f5a1cc7e962604c3ffe2809e14367958d896ad7bbe60244007.exe
    "C:\Users\Admin\AppData\Local\Temp\bdce59ea66b3e2f5a1cc7e962604c3ffe2809e14367958d896ad7bbe60244007.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3400
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4424,i,6510295916244954942,10164894160290787457,262144 --variations-seed-version --mojo-platform-channel-handle=4444 /prefetch:8
    1⤵
      PID:4112

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\$Recycle.Bin\S-1-5-21-2170637797-568393320-3232933035-1000\desktop.ini.tmp

            Filesize

            44KB

            MD5

            e2e46d51525707e730b66342d1a5cf13

            SHA1

            59bb1771b9232cf9f69799bb7aada8572e494b18

            SHA256

            56d5f3dd98993074647e10dac6ca7dcd7dd8ce16935de2694498c1cbebba5e7a

            SHA512

            cb3d196d945fc3fe4eee152e4330ba1b25e0392624ebb1aec24cc79cbbad63dd703f145313f221a49a4be1cb955e4cb8e5b581992eadb5b5ac9ad109e19da019

          • C:\Program Files\7-Zip\7-zip.chm.tmp

            Filesize

            156KB

            MD5

            104125d151b426e988b4def0ec342fc9

            SHA1

            9340051e0bcc7b968ac35ae7d3dfaf2c57ca0ced

            SHA256

            36b97be7d7340a209c71ab41033a0195fbe28d7f4dda5345664f0e5fdfef11b0

            SHA512

            7f6990179c75bf8992ccfd1d79e05f6e6fbc694c7e6f5ced758744a26618c992adfac7a631cc8e7da672d067307cb168b62c341230bf7c620efc9d32928c61f1