Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/09/2024, 13:12

General

  • Target

    61ec757278070446c10acd56270cfd70N.exe

  • Size

    48KB

  • MD5

    61ec757278070446c10acd56270cfd70

  • SHA1

    7c28739316ac93c172d03665ea77e43a747e7c69

  • SHA256

    9513be314bb3d7cec19a460b8b551d00b1ae7030706cf66462d8527c8ed91181

  • SHA512

    2e81fa859c763405420a649a886da0e946a1df989683e6714fdf29f9972b4694a8c6ae1c4dca8681ae4371b873033e7ecfcab593a5d56be14444c46c1d51ce1c

  • SSDEEP

    384:GBt7Br5xjL9A7AgA71FbhvnIH2YsTKnKqtaW3W4:W7BlphA7pARFbhvOsTKnKqtJ

Score
9/10

Malware Config

Signatures

  • Renames multiple (4368) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\61ec757278070446c10acd56270cfd70N.exe
    "C:\Users\Admin\AppData\Local\Temp\61ec757278070446c10acd56270cfd70N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4020
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3996,i,1729213506309163284,12809566808978835441,262144 --variations-seed-version --mojo-platform-channel-handle=3856 /prefetch:8
    1⤵
      PID:2824

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-2170637797-568393320-3232933035-1000\desktop.ini.tmp

      Filesize

      49KB

      MD5

      0f43b13b246e93ff26af231275362ec3

      SHA1

      6dcd37d77b0a32e14b1a63b52a54c502f72df5e2

      SHA256

      05fc909e5ca691c4cf174d54286fd76b11772ca4103f3e0a9a78fe8da86b85ad

      SHA512

      6752d172bc6e3e8aba34ae97dae641130da635eea5256fa0f525778c340c5de19f4f789283fdefd8b87bd9b3b2ba4e9b8dc5dceca8d282af1ca2e27f80075e33

    • C:\Program Files\7-Zip\7-zip.chm.tmp

      Filesize

      161KB

      MD5

      c6d9f690f6a44851d4ecf82ccef1ddc1

      SHA1

      9d585910798fa9b8174011acd48caf1730887cf1

      SHA256

      f3ff0ceabf4ad915545a3fd4b8b1750ba383dfc65333222e4ef1233893e655e3

      SHA512

      03cd9ffe1b15fa34eb46052e03b30d7e743f167f0de4f005fc122305fa41b821652c80d0ba0909713a0d247ba67c462d854ae22c252df6dc50ada49c4b28940b