Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-09-2024 18:53

General

  • Target

    79e291386ffce5158f84673f74ffb770N.exe

  • Size

    49KB

  • MD5

    79e291386ffce5158f84673f74ffb770

  • SHA1

    7ddca256cda93d8efe04044dbd0aa80622af1c54

  • SHA256

    63e7263fbc54c4903a8a9800166a0d3741b49c4f19e8be864005c4be6b4272af

  • SHA512

    d115bc952c93e792b22fc506406d1247fb7d2db54c7ea0f2008396835e255a408e3fb7b54e85e86744ccd38dd2f4301670141ffaea9c1fc02cf4bc1f3c70359c

  • SSDEEP

    768:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJhATNyHF/MF/6m0m+s2BGUG3oxoYM2M+ST:CTW7JJZENTNyl2Sm0mKdSarSaS

Malware Config

Signatures

  • Renames multiple (4359) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\79e291386ffce5158f84673f74ffb770N.exe
    "C:\Users\Admin\AppData\Local\Temp\79e291386ffce5158f84673f74ffb770N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4928
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4248,i,15436195446242760253,4000484513008731869,262144 --variations-seed-version --mojo-platform-channel-handle=4308 /prefetch:8
    1⤵
      PID:1168

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-2170637797-568393320-3232933035-1000\desktop.ini.tmp

      Filesize

      49KB

      MD5

      0b61c2d764a249d146664f94647419dd

      SHA1

      d4484dfde388ad54b641b99cf6864cce727f7c04

      SHA256

      52a1fb80919497f9c000e7dfdcc0b1d90747fd8ff77c57892d910fc2292c776b

      SHA512

      8fafd6990ab37f43c6af94abdbe5d10cd60dc9eb2e7ba598f72a12de641d32b1793905b6ba8af9351527ccd073ea2cdc647714775a60aafe3e75e22d468f52d9

    • C:\Program Files\7-Zip\7-zip.chm.tmp

      Filesize

      161KB

      MD5

      ba475c5c058094eee4ba700ec453a97c

      SHA1

      5aee04b6e5e02c799f547bb30a7335c335ec7cd7

      SHA256

      7f6e0cb852a52b8eeaa1e87d12b845d8c65a8d79b347152c9c9faa63607c616a

      SHA512

      2661b8190018bdb470402bb7baf757172067ea377edcbd7e55f24ec4e0de35b58de2e155b6c02557351166aa53538c2770d93226f9f9f6c0a5fa916a846f274c

    • memory/4928-0-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/4928-809-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB