Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-09-2024 08:54

General

  • Target

    16df87b15565ba524cc28886a10a8af02dec5aad626874d9779e4000399d42beN.exe

  • Size

    101KB

  • MD5

    4902ae2031d7fb54f5fa7882757c2f70

  • SHA1

    b5f86d9fba455342a4ed92e5881d4d33c39d1909

  • SHA256

    16df87b15565ba524cc28886a10a8af02dec5aad626874d9779e4000399d42be

  • SHA512

    2c6232fcf4cf04b92ff40746c075fbe13e61b3bc85de300fec32acf02d6c30532d02e89e0137024b62ddbb167b8b06f87ca6b142221465c337230bf630379f06

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rE:V7Zf/FAxTWtnMdyGdy+TWUnMdyGdyWV4

Malware Config

Signatures

  • Renames multiple (4356) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\16df87b15565ba524cc28886a10a8af02dec5aad626874d9779e4000399d42beN.exe
    "C:\Users\Admin\AppData\Local\Temp\16df87b15565ba524cc28886a10a8af02dec5aad626874d9779e4000399d42beN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2516
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4512,i,4174666705242427184,7333705955694532165,262144 --variations-seed-version --mojo-platform-channel-handle=4224 /prefetch:8
    1⤵
      PID:4760

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-2170637797-568393320-3232933035-1000\desktop.ini.tmp

      Filesize

      102KB

      MD5

      e86d9cd8aee8cc4486a35630fccbc24f

      SHA1

      d8b2f07fa361f4a93346fe69518dfccaf30ca603

      SHA256

      3e542ff14e5b0eaa3cf903d01c1fe138c0a661a79b15120692f8a1b0c20030c1

      SHA512

      9c2fea3e4c889c5745fe3b960daffa609ce73ddf5f80dd67c50fd949d8b3cb5eb650eb3d0fae18062bd3832a9459dc68e050d6b60bcc7aaff1595009b3e0ebc6

    • C:\Program Files\7-Zip\7-zip.chm.tmp

      Filesize

      214KB

      MD5

      3e56b9babc7bad27522e85d59d3d7da0

      SHA1

      36573921c54da46f15619978169428a12574beac

      SHA256

      62ac056b303f8e0d43811df0d01bb7c7dd9813807deb4e5b9460fa1c5847c476

      SHA512

      e8a12c33c5b0c60182a9a3b87871607e43b926a7024093673fc5725197d8c8d42df39a977277c76cf21fb2f6bc94285f2e882253a919cf711410204eb69df677

    • memory/2516-0-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/2516-840-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB