Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/09/2024, 13:03

General

  • Target

    3a2129e541784f6aa314c450ec5197a0N.exe

  • Size

    30KB

  • MD5

    3a2129e541784f6aa314c450ec5197a0

  • SHA1

    6794959c0b45fcf42733aeaf6fb2ba57f2916c0c

  • SHA256

    18518c3c99ac327f3a72f2707368acbc89a68472d8ae14b8b283f2074fc0ce7f

  • SHA512

    6b5732f9b7680963c5953fd51ffc051c8c3f450d83cde7a40fc4e918e62456e1b43c76236ef12b4d2437276434d6ac077d578d51f50dc26c8b84582ef906244e

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI951ScN:CTW7JJ7TzUcN

Malware Config

Signatures

  • Renames multiple (4656) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a2129e541784f6aa314c450ec5197a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\3a2129e541784f6aa314c450ec5197a0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3740
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4116,i,1602949858158667699,12464335823361976127,262144 --variations-seed-version --mojo-platform-channel-handle=4448 /prefetch:8
    1⤵
      PID:2856

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-2170637797-568393320-3232933035-1000\desktop.ini.tmp

      Filesize

      30KB

      MD5

      dd07a1fe64999c436b4aca485fbad270

      SHA1

      3d05da599515b73899ce0c1dc811e72143e5476f

      SHA256

      b4d63c479a2cf3a61f9692bef9663d4f19499bbe0e089d3b71071d20f07484bb

      SHA512

      c077e2b9475921202ea529efaf9a88fc76a4c01c08af801a0bba405aed71ca9145c57860d5714ce1a0ca9f77cb1490539a803e2471773687924ef5a64168d032

    • C:\Program Files\7-Zip\7-zip.chm.tmp

      Filesize

      143KB

      MD5

      c87a8a95bafb0ddf24475ada00bd8de8

      SHA1

      52ead022008bc9c9ab9d494fe1723ee2e2944540

      SHA256

      cca0c50cc92f948beec76b068157e48857f54b4660aa862dda48adf0b9ad19da

      SHA512

      57702cbf4e35e1161abfa9416aa9b50459f51de53cf70e912d662d50d93c13187fc7669d46c30a6f96b3d819ec3b97567dc38b1e6c8a175bd5477642839cf207

    • memory/3740-0-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/3740-917-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB