Analysis

  • max time kernel
    149s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/08/2024, 22:50

General

  • Target

    698ec42222bf3633a7e452395e806d251f35b6eeb1894b13d0cf404b334135f0.exe

  • Size

    105KB

  • MD5

    8801fa82f0fbca63733c930bf1c46d97

  • SHA1

    7bf8cf66135c9d2e5d917e01eecd4c6dee5487c6

  • SHA256

    698ec42222bf3633a7e452395e806d251f35b6eeb1894b13d0cf404b334135f0

  • SHA512

    bc2aefa01ab2d98e2cc81496900efcfbe7baece8fae2437f2e3ecd8e9bb31c9083dbcc346c451b92fdac88e6a6d6614ffa71e742f4951d55827cf541674a7018

  • SSDEEP

    1536:W7ZDpApYbWjIlE77ufL2e+efZwZQ/8S/80PqPIUpCUpiPk:6DWpwE7oL2e+efZwZ08i8Z

Score
9/10

Malware Config

Signatures

  • Renames multiple (4838) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\698ec42222bf3633a7e452395e806d251f35b6eeb1894b13d0cf404b334135f0.exe
    "C:\Users\Admin\AppData\Local\Temp\698ec42222bf3633a7e452395e806d251f35b6eeb1894b13d0cf404b334135f0.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4300
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4020,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=3992 /prefetch:8
    1⤵
      PID:4088

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\$Recycle.Bin\S-1-5-21-2170637797-568393320-3232933035-1000\desktop.ini.tmp

            Filesize

            106KB

            MD5

            c02ff5619ee88749051d17e368db41db

            SHA1

            40a08068ff8865e51f2fd0dd3a9da736392c549f

            SHA256

            94f60cf426548ab9736b551a0435a3dc545df2870399b92a7375fb17ff642b2c

            SHA512

            dff32ea98bbec0ed8dce8b482371859b50d200ff94cf309f8a90487f146762e714f4dce7d38a431e00acb7b5fb1b854f0876dc69a0555fe8509fd1eac779b21c

          • C:\Program Files\7-Zip\7-zip.chm.tmp

            Filesize

            218KB

            MD5

            9cc0611a53bd417e2bda647324f8f91b

            SHA1

            1598317aff18f635a3b9ef55ed986dd5a7b83a62

            SHA256

            74d0b94be4a68cffcd5bf282c7b5e747507d469784ae13b7932ad93814f9ccd6

            SHA512

            a9b1803ceb31e1b936a81b317ab5eb93f858d69d20f4b9541d5efb0897f0a872f0d1ea0553a611ea20772c7fb30cd05f1bad0c5892b82a45dde308605ac4e7cc