Analysis

  • max time kernel
    150s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-09-2024 03:37

General

  • Target

    9a49a9b0e634031dde83e3a0ce184ef86e4aa6c5017d21aa16d36b59430b3407.exe

  • Size

    49KB

  • MD5

    d4b688ad1dc3e63223e9982beea304af

  • SHA1

    9cdb0f7ad71f027418503b3f25fb70c6dbe9020b

  • SHA256

    9a49a9b0e634031dde83e3a0ce184ef86e4aa6c5017d21aa16d36b59430b3407

  • SHA512

    34f130b3ebf72308812a296fdcfe548bd3d78b17777bab903b615e9179d230b5af2331dbdd74331458ee63a96dcc30d11a0319cdf5506b8166a4772607ec1783

  • SSDEEP

    384:GBt7Br5xjL9AgA71Fbhv7bhvo42L5FgAytBVRz:W7BlpppARFbhjbhg42LcfT

Score
9/10

Malware Config

Signatures

  • Renames multiple (5026) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9a49a9b0e634031dde83e3a0ce184ef86e4aa6c5017d21aa16d36b59430b3407.exe
    "C:\Users\Admin\AppData\Local\Temp\9a49a9b0e634031dde83e3a0ce184ef86e4aa6c5017d21aa16d36b59430b3407.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4984
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4208,i,6510295916244954942,10164894160290787457,262144 --variations-seed-version --mojo-platform-channel-handle=4436 /prefetch:8
    1⤵
      PID:5004

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-2170637797-568393320-3232933035-1000\desktop.ini.tmp

      Filesize

      49KB

      MD5

      698ea1b1df4e109b70a78dfdfaf8db2e

      SHA1

      d8f7b0790f7f81ebcf5ddf17de9748edd575fdad

      SHA256

      c74506800747236604353e49f10df06d743bf42b8bbbc9a8db1947bf0a3023eb

      SHA512

      9e73cce36de1a77bc0c67ab4a2f150b2cb6c933787adb6d7e089e8e0684e1b7aa19f7f4b42ef247e3cd143ef2ebd32efb5b9dadc4d7031c9a8fed48cbb600d26

    • C:\Program Files\7-Zip\7-zip.chm.tmp

      Filesize

      161KB

      MD5

      a633281ec9dc57124254e3abddd56e1e

      SHA1

      eef7ce8a374853a47b374ac41c615994942508c3

      SHA256

      a01d56978cb4d12e0a717d822dc638150983605f1385d68ea82d88a17369409c

      SHA512

      4319a5038de85c4e108930b83061657b4686f4e048c57f0bd4cec3067fbb0b5a44d556419776fa563ec7dcc545434df199a1e2b96f2b658d2c4638b015e77038