Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/09/2024, 19:46

General

  • Target

    ce784f0f41fb8c21b9b5e01f0022d220N.exe

  • Size

    78KB

  • MD5

    ce784f0f41fb8c21b9b5e01f0022d220

  • SHA1

    8583d80bf1b973c6f3488e43c47571661e364400

  • SHA256

    a6950c674ec5b56f236be04066da3d5fa311fb551b9fc4191b083115f589c43f

  • SHA512

    400b5f936d6562a852a1dc8730a29ca948e567de1d26e75788844cd6c97314a64e09045e533bfbeea0bb6bb3851c77837d5d5baa7fc3b259d5661f813847a89b

  • SSDEEP

    1536:V7Zf/FAxTWoJJ7TzJvTW7JJ7TzJixbDxb2:fny1+AxbDxb2

Malware Config

Signatures

  • Renames multiple (4346) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce784f0f41fb8c21b9b5e01f0022d220N.exe
    "C:\Users\Admin\AppData\Local\Temp\ce784f0f41fb8c21b9b5e01f0022d220N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4752
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4348,i,1828333185976713750,7918646547767660928,262144 --variations-seed-version --mojo-platform-channel-handle=4408 /prefetch:8
    1⤵
      PID:4456

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-2170637797-568393320-3232933035-1000\desktop.ini.tmp

      Filesize

      78KB

      MD5

      7de19c9b9d2182e640a3d4298e289339

      SHA1

      04301091ca77fc4e74ed37d8fe50103552cae326

      SHA256

      0ade44f54cde190ec9980ee5145a3a9135cecf6844f3000d2aa701ba494c3b67

      SHA512

      9f33d8eba772935ec96758e606fa056f388db19ead823d147a87ebf07645a95b8181d2245ee605971738f91f3b6c4c3f7cd579b99b835ce12ec244a4ca85e96c

    • C:\Program Files\7-Zip\7-zip.chm.tmp

      Filesize

      190KB

      MD5

      8db6d06702d5fb9db80930edf35b8457

      SHA1

      b9f8d6b9a4c4877532e8f89735273e9a616ce1d3

      SHA256

      3796d3b0f46c965f052f44fadd4577d75cc367a2cc61cd60f3eaa1bd620fa058

      SHA512

      021fb9da026790df43e3be4f255c7bf327680f4bc73188f529145cdae9f645b5a5521ad3f244dcdb74737eeaebd79016e82fe64064b020ad95906fe9ecc9d020

    • memory/4752-0-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/4752-820-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB