Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/08/2024, 02:35

General

  • Target

    629020e3c86c0cb5c7f2bcc6a9c8bdc0N.exe

  • Size

    78KB

  • MD5

    629020e3c86c0cb5c7f2bcc6a9c8bdc0

  • SHA1

    19ad9077e4a962d73289d3c240c13e82e0f0bc4f

  • SHA256

    2b26d6e3d0c44c813c0067269b821f58e5eb9373aa0545450579db7a56daafcd

  • SHA512

    0c4f7125741fefe45009745665af31612e6fb9022e753c93138b4ea5cdef6be5feaf70d70c1b6fa147fa49f52a391023317a9fd9b273ac509b9b32f74e1833f5

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJBZBZaOAOIB3jM2jMO/7OSoEXBwzEXBw2E4GP:V7Zf/FAxTWoJJB7LD2I2IbSEP

Malware Config

Signatures

  • Renames multiple (4311) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\629020e3c86c0cb5c7f2bcc6a9c8bdc0N.exe
    "C:\Users\Admin\AppData\Local\Temp\629020e3c86c0cb5c7f2bcc6a9c8bdc0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:316
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4448,i,1602949858158667699,12464335823361976127,262144 --variations-seed-version --mojo-platform-channel-handle=4412 /prefetch:8
    1⤵
      PID:4752

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\$Recycle.Bin\S-1-5-21-2170637797-568393320-3232933035-1000\desktop.ini.tmp

            Filesize

            79KB

            MD5

            e21cedc9a1b8bf9a51e5f54cfb388298

            SHA1

            73573c38bbf88297e34f470384b5b1c988baee6b

            SHA256

            43a54934f6ef7e34d9050830e08c7df4a7219ab13df7d6dbb4669a4b04cb8ecd

            SHA512

            b85128ede9d726cfb8089c05c4cdab6801f376ffdd67e3b9302c9aeff09a0b0beb7c899a561c033ca99bfe6eea51af87442a20664794f000e32214ada5fe25b4

          • C:\Program Files\7-Zip\7-zip.chm.tmp

            Filesize

            191KB

            MD5

            9dc53434a12300bf651135ad125e536c

            SHA1

            f8ee40343a06f4cfd5f6af6f1fd1bf973c0a2a7e

            SHA256

            c3b14e60398090fe7b02ae0d3c220f65e9a51d8b55d752bfb34bbd542c471943

            SHA512

            971fb6b1e5f1c126ac395e940db212fd1647843640f85d0695fb15bcf620852ca04dc707ad77ee9a887656055734bd020524b4e97f65baf97ec6dbb4c5e45f55

          • memory/316-0-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB

          • memory/316-786-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB