Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-08-2024 00:28

General

  • Target

    70e679ac866fcc33f67ed909c1b80380N.exe

  • Size

    32KB

  • MD5

    70e679ac866fcc33f67ed909c1b80380

  • SHA1

    3852c5facad348dc1a8d0974dac41c39409e288b

  • SHA256

    050de87ce53765e7412ae6ae7c35a76fb5eb5e5649cad99cda6ada90dce3f772

  • SHA512

    72a9a28d5d3366e645c781d4c7f0ea9843ec3c2168470b3422d687d0a761597ea109e0084065bc990d8834581a53bfce1f0852788e4706d64fc0ac8133e737b7

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9vWyKoIWbsHfySkT5GeQbyi348oWc1RPOzkjf:CTW7JJ7ToyKoIWbsHfySkT5GeCyi3488

Malware Config

Signatures

  • Renames multiple (4626) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\70e679ac866fcc33f67ed909c1b80380N.exe
    "C:\Users\Admin\AppData\Local\Temp\70e679ac866fcc33f67ed909c1b80380N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4352
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3036,i,11251706013556949551,5157034131170452377,262144 --variations-seed-version --mojo-platform-channel-handle=4188 /prefetch:8
    1⤵
      PID:3112

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-2170637797-568393320-3232933035-1000\desktop.ini.tmp

      Filesize

      32KB

      MD5

      f9fddc18a787a23ccca54e5205a8a610

      SHA1

      fca9226fe7f21f43d2332252163c6bf77becff26

      SHA256

      6548f3fcd55ff0a1bf802302bc744e0fcce1b9372be3de981b028f2d2d5e4a82

      SHA512

      bcb5d2f09c0892ada7e6245987ade157a3afec0909074f69afeac882f702455623ddc2204791263bd722614d9e203792cfcbc1c3eaf33c62edf9bb25e5a3b8fd

    • C:\Program Files\7-Zip\7-zip.chm.tmp

      Filesize

      144KB

      MD5

      a9e680e722d093f54e394788cd5991a7

      SHA1

      fe2f03bfc0eac7073098de83e2f6fd8798b214f9

      SHA256

      dc1a2d805146290674b95855ce4df5debe1514498d6b48bb936a49b192ada54a

      SHA512

      6e0cf54962fd4d413b77232d6317859ee783ba2a48743f13b4d8a0064096573cb365b68fdb8d1d498879c27a36a49e56c98c3eaf672c5a143c554449d1f8e13a

    • memory/4352-0-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/4352-857-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB