Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-08-2024 20:57

General

  • Target

    921da0373da8852057d5644b01c81450N.exe

  • Size

    71KB

  • MD5

    921da0373da8852057d5644b01c81450

  • SHA1

    9ff69d50d10b979d8a7d0da2a8371b6cb35a1cbe

  • SHA256

    4c0a71a4feee1186cc67cdf127640d37fd122157efb97aef862e055227382211

  • SHA512

    030d78026a03623b39e58d60ead3f7e289a112022282e070a02dc1574df300907d59db61d6c719440667479fc71b81b4d74ffa4aac60bc479a78ab8fbcf88a47

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9CBT37CPKKdJJ1EXBwzE0:V7Zf/FAxTWoJJ7TiTW7JJ7TtRd

Malware Config

Signatures

  • Renames multiple (4316) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\921da0373da8852057d5644b01c81450N.exe
    "C:\Users\Admin\AppData\Local\Temp\921da0373da8852057d5644b01c81450N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3784
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4388,i,3210801877307184477,8078594481454001567,262144 --variations-seed-version --mojo-platform-channel-handle=3864 /prefetch:8
    1⤵
      PID:1604

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-2170637797-568393320-3232933035-1000\desktop.ini.tmp

      Filesize

      72KB

      MD5

      b4408209163fa8b81e74c0eccee90878

      SHA1

      93daa7d5a4a8f7eb4dc07d8242fe7b3b50481e9d

      SHA256

      1533cc4e8ba492767d0950b50858e3e5ffb30cd22902ec84e90f993acf6ab6af

      SHA512

      30fc83c9b30869ab289bde8ea35aca73e5825d924c5a5570ea56102986dfa067cfe9f72d47ec285025cc4de659a1ee1508cb9fc986a40490b8c30251299198eb

    • C:\Program Files\7-Zip\7-zip.chm.tmp

      Filesize

      184KB

      MD5

      ee5487329ba14eb1460c3bddc5d65d00

      SHA1

      43fc9a5c5e74e0e77512281608dd3759026a7e51

      SHA256

      0dc82fef201103ea5dd59dbfd640ae17266bfbe6fadd999e42324c25f422f589

      SHA512

      012469e4f8e43f98440704fa832135cbdadbfe2954b1031156b23679ad734c25ecf7b462c47797fbf790d8c17cd1c99aa8f71318807b20f83fcc5283ede2bcd2

    • memory/3784-0-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/3784-808-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB