Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/08/2024, 02:07

General

  • Target

    c0f31d961604cfbd43b5e7669a07ab1a5928ccbc9be3b17432f4a582e02df588.exe

  • Size

    91KB

  • MD5

    8a694cfafdede3e073f0e9dc63a8742f

  • SHA1

    9622459d5ccb60081ce4361b6d9c6d4870a247f4

  • SHA256

    c0f31d961604cfbd43b5e7669a07ab1a5928ccbc9be3b17432f4a582e02df588

  • SHA512

    6d66f1e8d64ff898bf17de977dd7046a375f1d69b3077639698af39094964b84486192128dc60a7beea27ac734196e3653dc2359c089a0a29c6ffec43cfac81f

  • SSDEEP

    1536:W7Z9pApQESOHepOHe8G+6E65dyGdykNdNBKgg+EvBnHHwTVEvBnHHwTB///O:69WpQE0zxg+TPnO

Score
9/10

Malware Config

Signatures

  • Renames multiple (4837) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0f31d961604cfbd43b5e7669a07ab1a5928ccbc9be3b17432f4a582e02df588.exe
    "C:\Users\Admin\AppData\Local\Temp\c0f31d961604cfbd43b5e7669a07ab1a5928ccbc9be3b17432f4a582e02df588.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1328
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4264,i,10065386245627775856,6567048529106473151,262144 --variations-seed-version --mojo-platform-channel-handle=4004 /prefetch:8
    1⤵
      PID:1828

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-2170637797-568393320-3232933035-1000\desktop.ini.tmp

      Filesize

      91KB

      MD5

      9cf4978f060343e0c8d7bc5319620dbb

      SHA1

      eb559b958e33865991dfd0161f92f321bc431cf0

      SHA256

      f1a9e799f9def58cb3cac7a1cbe3874b8df4aacf9d30e30f8da0616cb38b87b3

      SHA512

      e8a2be57c7e0c8577e7048b455dd5b63f15b37095ff93d9548294e14b0db172f754359b60818d8b4f05ffdc6d671fefc0cc3554a40ed170515b5a8b1577e6f7c

    • C:\Program Files\7-Zip\7-zip.chm.tmp

      Filesize

      203KB

      MD5

      c080b31addd626cf127cebbee50b875a

      SHA1

      364639d2e4dd95104b9963447915c9600d24ccf9

      SHA256

      1b956126320cc894a2ca172823e2995c088f5d7f310650a6f250ab327b04677e

      SHA512

      e140c90257c035697756a47fcb1af04ed52109f6c6d9ad9ad5d3187acea7cc639f9d08f7dcb27f1f98cffb161d973209bf1f2ed58b3f7503e62bd53c3842a061