Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/09/2024, 09:20

General

  • Target

    4b2b256a81b429c0764ab7302aa19170N.exe

  • Size

    54KB

  • MD5

    4b2b256a81b429c0764ab7302aa19170

  • SHA1

    f2740b90f23580e584036bebbb733ae03da7ae08

  • SHA256

    001e592e1a99ffdf1b5f778c4819302c64c549d6ad31c4fdb4f5b8ea9c16a2c0

  • SHA512

    3785054ea8527d770372f66e732f336ae088ece3f1b3b1b64aba728541d066fa352d6f3a6018e89976d3605d982e2ea7c48e525558b1cbfd7d2351e0fc6799e3

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9DJKGJK9/YzT7zTs:V7Zf/FAxTWoJJ7ThJKGJK3

Malware Config

Signatures

  • Renames multiple (4617) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b2b256a81b429c0764ab7302aa19170N.exe
    "C:\Users\Admin\AppData\Local\Temp\4b2b256a81b429c0764ab7302aa19170N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4400
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4076,i,12198811467968044966,17227406646827438786,262144 --variations-seed-version --mojo-platform-channel-handle=3940 /prefetch:8
    1⤵
      PID:2172

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-2170637797-568393320-3232933035-1000\desktop.ini.tmp

      Filesize

      54KB

      MD5

      9b9787f434e8e14790d7c0a37344be50

      SHA1

      84d3bfaa1cdf9bf364608b91d49f0c862a6e853f

      SHA256

      666bf6012ebed2eefb49643f8fdb2ab518c48dba925c617153dacbd805dd5655

      SHA512

      a7b23e900c63f8498bea023ebce6a4bda10c961016cbd836cb590f41ca52a24125082790da08afb9332fb85eae3c14ce664792e276a5c1e8b2f4ad9676261316

    • C:\Program Files\7-Zip\7-zip.chm.tmp

      Filesize

      166KB

      MD5

      d86ad7042b987e176e6e63dba2ac1793

      SHA1

      5d7cc51069943b58a45feda6561bdd72b67817c4

      SHA256

      7f85019d84e65152f8e8a626612d91f1230171ef64f732fa23138a2350652cc1

      SHA512

      70543171e7beafadeac30b76eb6966b56bacf403dc1369e90d9d68edef1affd6fac9917694bc4aa4a84117808e24007b672db894b22d87f96dd3200020fa57dc

    • memory/4400-0-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/4400-858-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB