Analysis

  • max time kernel
    150s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-09-2024 12:46

General

  • Target

    Trojan.Danger.ATA_virussign.com_500837d9b424659fe8d003d5c8896931.exe

  • Size

    103KB

  • MD5

    500837d9b424659fe8d003d5c8896931

  • SHA1

    c6ace3849a7303d6ce3c08a3f8216cae92b44382

  • SHA256

    a988085ba5e2e6b458b46936525d7fac89c64d99d5dbed5474680a132fafbad5

  • SHA512

    359911deea699b40973361e28def6eb513d090e30246ca6b8716606e86e48eeba9a8ebd61aa069f13360af38d952c18d3ffb4579db901114bed3cfa48ababa21

  • SSDEEP

    3072:6pWpUFpEhLfyBtPf50FWkFpPDze/qFsxEhLfyBtPf50FWkFpPDze/qFslEhLfyBU:PqFF2Ie+efsL1UabUaG

Score
9/10

Malware Config

Signatures

  • Renames multiple (4243) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Trojan.Danger.ATA_virussign.com_500837d9b424659fe8d003d5c8896931.exe
    "C:\Users\Admin\AppData\Local\Temp\Trojan.Danger.ATA_virussign.com_500837d9b424659fe8d003d5c8896931.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2320
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1296,i,1602949858158667699,12464335823361976127,262144 --variations-seed-version --mojo-platform-channel-handle=4360 /prefetch:8
    1⤵
      PID:4348

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-2170637797-568393320-3232933035-1000\desktop.ini.tmp

      Filesize

      103KB

      MD5

      d419e4d71045e8167454d076a33d56cb

      SHA1

      603cb9acc4cba3e78e453124c22b0ec43798bb9f

      SHA256

      c1aa992da024c5dd1b3f8564cc26be84d8cf1470faea047c2c32b123bbc3d95d

      SHA512

      1232d6d436e6a24810f19896a3108a1a9cc7cf47becf3cf118429f1cae8943dd6ef0de8322cf183e2566af241eecf4626f62d13b090df7f2c76e58ff48c1087f

    • C:\Program Files\7-Zip\7-zip.chm.exe

      Filesize

      215KB

      MD5

      abc96978bb7586b5534ecb3e0f5766ee

      SHA1

      1ead5ac39a843e4834fc6cf018ad03fb4558d438

      SHA256

      f49e86b533d126d3a03cb24c9a273fe6680438ad13a290679c882b7a6821d2c2

      SHA512

      29c1ede0b53029fef94374f77f0141d9ecf94d291d0be3bf358079d99f0613941daa3713891219b446aa95045022cf79feaa169268e1e32c252c093a5bbb93fa