Analysis

  • max time kernel
    150s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-08-2024 04:47

General

  • Target

    f1d98b7004ac17d06f2b395131133cb6ca6b00a13307af3d432d60e0a225c0a9.exe

  • Size

    73KB

  • MD5

    3117147780b585bc653f21cd23a11679

  • SHA1

    5a0d9ec2ca2572cd17324fd7bbaa7a79b95cf6c1

  • SHA256

    f1d98b7004ac17d06f2b395131133cb6ca6b00a13307af3d432d60e0a225c0a9

  • SHA512

    77008a1441738953d7521ab77da606e02b23cf5b890ea83147b441ebece205973632d743db5b7be5685a86c18ca3fb452537964546f250834db5b8e04ad2e40b

  • SSDEEP

    1536:W7Z2sspApkZrZ4+fU7lK1lKT8/8YZSQ4NQ4L:62ssWpcU7lK1lKgkz9N9L

Score
9/10

Malware Config

Signatures

  • Renames multiple (4855) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f1d98b7004ac17d06f2b395131133cb6ca6b00a13307af3d432d60e0a225c0a9.exe
    "C:\Users\Admin\AppData\Local\Temp\f1d98b7004ac17d06f2b395131133cb6ca6b00a13307af3d432d60e0a225c0a9.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4500
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4304,i,8548254608087149642,10333768245962368401,262144 --variations-seed-version --mojo-platform-channel-handle=4040 /prefetch:8
    1⤵
      PID:2288

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-2170637797-568393320-3232933035-1000\desktop.ini.tmp

      Filesize

      73KB

      MD5

      57baadfe3bda7f4932bc8d4b55b1a286

      SHA1

      5ddea5b6bf7173d433aafa7983d45db9cee37a27

      SHA256

      64b0b02603b5c79387c83149fd249715746f47c9e9b284aae0cb4b4f64e4593f

      SHA512

      a1e96712695431ae25cf0a92b85f53260e7fa236f4c093ac5179a2170329f6d58de2fc9d754290e3a9a3aa278f3df430f79164bda0764a0336bc92aac410ae84

    • C:\Program Files\7-Zip\7-zip.chm.exe

      Filesize

      185KB

      MD5

      8794fd47fdd3ecfcce02d39ee3a4e03a

      SHA1

      7f9eb0c062ba0e1f1521b9e3d84890655f5f6022

      SHA256

      15894bfc44063f254a2a23ab29d1f9955460dbabc33b55aca5562975c04d768e

      SHA512

      ccc6b267d1e26d537280a55b0eb40b6f9de2707b172bb27a849f92dbd05bfe5ffce469bb7a94fd562e0415082b6e7673594a2ddc614e824fffbeb5e909439fc6