Analysis

  • max time kernel
    150s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/08/2024, 02:37

General

  • Target

    c0f006175b0f8b6f889937965ccfdc10dc91a7fd27823ca8cb11d0d076083f1a.exe

  • Size

    37KB

  • MD5

    26a82dea9b4018c280f3fa55063d9247

  • SHA1

    d4900fd91f176ed4769a81898a8e3c6c03d2436a

  • SHA256

    c0f006175b0f8b6f889937965ccfdc10dc91a7fd27823ca8cb11d0d076083f1a

  • SHA512

    68efaa46790597d456cd9c01b89a80153f9f8d579ea21a82fde3a7602ccec66eea48b24b5dd68148f665d9b062497049a73334957dffb5865ac1a8b17444af4c

  • SSDEEP

    768:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJhATNydWK9WKF9ADJ59ADJsmrIvg:CTW7JJZENTNyoKIKMmrIvg

Malware Config

Signatures

  • Renames multiple (5129) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0f006175b0f8b6f889937965ccfdc10dc91a7fd27823ca8cb11d0d076083f1a.exe
    "C:\Users\Admin\AppData\Local\Temp\c0f006175b0f8b6f889937965ccfdc10dc91a7fd27823ca8cb11d0d076083f1a.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1180
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4348,i,11391966286255097843,10588851088187498028,262144 --variations-seed-version --mojo-platform-channel-handle=3904 /prefetch:8
    1⤵
      PID:2488

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\$Recycle.Bin\S-1-5-21-2170637797-568393320-3232933035-1000\desktop.ini.tmp

            Filesize

            37KB

            MD5

            25c29c9a06343ab46547101ae4eb2ad7

            SHA1

            e519ddff34c1306d799d18375d8064c9d0856f0f

            SHA256

            4ef6f86c05d45be77d3f4463fc5c4275b28126e2ed2c859d82dae18bfaf0b91a

            SHA512

            2d65da97c22d5d56b3387cf2025df7a58e846fef81ab0cd58c8c8cc5d8d80dcba45a9cf2969af3c5bd8d46e4c6c40d96e796bdce3acc0eac2ef7ce327644dbf1

          • C:\Program Files\7-Zip\7-zip.chm.exe

            Filesize

            149KB

            MD5

            e784aa106d072cf1102e3e083fe29821

            SHA1

            91c93c75a14ad5392ab2197c0a58a5a51d0a7d38

            SHA256

            ba54a7f3e5d9160c4fd5ebd6eabc65ae03e8a4c6b833ccbaabf1cd700caeecde

            SHA512

            7a91c597587000a374773921cc7e4fc0d87dc3278aa6954089b568708d8cb9422e11fcccf305ae3182f01f25089e4ce2202f33d5ac5a268d1138f9c522c6f299

          • memory/1180-0-0x0000000000400000-0x000000000040A000-memory.dmp

            Filesize

            40KB

          • memory/1180-880-0x0000000000400000-0x000000000040A000-memory.dmp

            Filesize

            40KB