Analysis

  • max time kernel
    150s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/09/2024, 23:30

General

  • Target

    804b181c4e1c33d25d3e834334c49e28c151aaab06e2626d2deed7d3faa57ee6.exe

  • Size

    94KB

  • MD5

    76de963eb46d3f3ee3f259a84c3a7a44

  • SHA1

    a5a771e5b0437a493f19672898a2db4147f95c51

  • SHA256

    804b181c4e1c33d25d3e834334c49e28c151aaab06e2626d2deed7d3faa57ee6

  • SHA512

    e70ac281bfcdf3caf0b883e2294d11476294e26b1c4baca65ef0858ad1e32f470fcef13cf9565c3e75e1f818a0c8d5a94ef7b1b59bc0b66ead90f4ed0c7b8891

  • SSDEEP

    1536:W7ZhA7pApMaxB4b0CYJ97lEVqNR7Yge+eTdsdYSWXBfZWZK:6e7WpMaxeb0CYJ97lEYNR73e+eBSWXBT

Score
9/10

Malware Config

Signatures

  • Renames multiple (4864) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\804b181c4e1c33d25d3e834334c49e28c151aaab06e2626d2deed7d3faa57ee6.exe
    "C:\Users\Admin\AppData\Local\Temp\804b181c4e1c33d25d3e834334c49e28c151aaab06e2626d2deed7d3faa57ee6.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1136
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4308,i,10065386245627775856,6567048529106473151,262144 --variations-seed-version --mojo-platform-channel-handle=4276 /prefetch:8
    1⤵
      PID:4840

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\$Recycle.Bin\S-1-5-21-2170637797-568393320-3232933035-1000\desktop.ini.tmp

            Filesize

            95KB

            MD5

            b4d85a37e64cbda8f70456401e65a459

            SHA1

            b73efac507e90acb4f39a6c7ba32eadb2dd8e1f6

            SHA256

            be07cb8ddb810aad85bc8e1c8c8147f33cfbb09218ada7e100c3bc8456e4bcc6

            SHA512

            7b25ad0a5cca1e5b9cbe6dc914098fd4ac95b267d9b1b56a80f7ec13eebee5f974db7070b0bdb7100eeff918cb777bc43e0edbf45fa9695d587ce82a35bdbeee

          • C:\Program Files\7-Zip\7-zip.chm.tmp

            Filesize

            207KB

            MD5

            f7abc4bbe00483e3d70fd4415d47d469

            SHA1

            11aeda4ea4b75e873ba02c0d610c6979b5973505

            SHA256

            79ae50e84e2c791f02c366aac8a4d44462f9ccdb9f2560cdab00456801d8a493

            SHA512

            9dc48f7025373e3e5c5ff68c409daf202ef82cbc6fa7db343f66024ac195f52f8af24b39a4374132a7aacafac807a4a201055cbb9f4602ba259aab4e6cb474c8