Analysis

  • max time kernel
    150s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 02:54

General

  • Target

    7e60c7b147e3f67da0edb91e48c316399a65dea6718f431f7694d508ac31e52dN.exe

  • Size

    46KB

  • MD5

    1cc38091617d3d7ae3d847580b0a01b0

  • SHA1

    d7d0df423b17d90d375b5e90bb83f071d87d5552

  • SHA256

    7e60c7b147e3f67da0edb91e48c316399a65dea6718f431f7694d508ac31e52d

  • SHA512

    c327d870392ad574f72e70e0866aa54c11f398fe0480088cbb1345a8d14256eba8b3cf098e451345cb6519be523aa335cebfbbb04b8641ae82e18ebd25888126

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9HSz:V7Zf/FAxTWoJJ7T1Sz

Malware Config

Signatures

  • Renames multiple (5042) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e60c7b147e3f67da0edb91e48c316399a65dea6718f431f7694d508ac31e52dN.exe
    "C:\Users\Admin\AppData\Local\Temp\7e60c7b147e3f67da0edb91e48c316399a65dea6718f431f7694d508ac31e52dN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2056
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=2708,i,8231329449558834090,4540802069600791165,262144 --variations-seed-version --mojo-platform-channel-handle=4460 /prefetch:8
    1⤵
      PID:3684

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-2170637797-568393320-3232933035-1000\desktop.ini.tmp

      Filesize

      46KB

      MD5

      f8892a62cfe5966e363aa664df252843

      SHA1

      50fdd2ec7449f54972360bf5c83cb44d07c72341

      SHA256

      c1675a821c91b88d833cc59cfaeb0892ab6fbc9f6d57bab90302b567086870fd

      SHA512

      63741d8a3c9e1b57a35bfefcaf93d267a8823a56541bd88ff4fb7fa27865fd0cf680906329aff04b26255a5634262c4774de115b2da4c512982042b497253f10

    • C:\Program Files\7-Zip\7-zip.chm.tmp

      Filesize

      159KB

      MD5

      db62c8d738f7d88f4e76b24b938b5e23

      SHA1

      1fdc8f79ba2b99d75ba3ead137db4d6dafdbfbdb

      SHA256

      ece899ac754f021f681a966356b71c33ba93467431e74469f0c3dfb10a1ee329

      SHA512

      bd870f387bbdcb84fe8cda192c00e709bd9e143bf63f7b811cf660939f0389edecfc59fce7de47f9b5fcc00f9ac73383f2acf237a7ef0245fa7b19ff5dcb2231

    • memory/2056-0-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/2056-902-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB