Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 04:34

General

  • Target

    c2fc76b38e4165f94a59b8d3489b063008127f569cfb3cb6bc629749a60dd6f1N.exe

  • Size

    57KB

  • MD5

    fa5270dffc768f6528854b1c668a6580

  • SHA1

    c72c1022d1d0d01275f22f16cd344f14017cda81

  • SHA256

    c2fc76b38e4165f94a59b8d3489b063008127f569cfb3cb6bc629749a60dd6f1

  • SHA512

    35b683d91d95d55e0960f275afde650280f8c94d045605d536e988fa9a60bb7dc80809d59a1ad437d70fcc116a6f71954fce27fb59cd09d78d49319604fb2c7a

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFIZ:CTWn1++PJHJXA/OsIZfzc3/Q8IZTyp6

Malware Config

Signatures

  • Renames multiple (4572) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c2fc76b38e4165f94a59b8d3489b063008127f569cfb3cb6bc629749a60dd6f1N.exe
    "C:\Users\Admin\AppData\Local\Temp\c2fc76b38e4165f94a59b8d3489b063008127f569cfb3cb6bc629749a60dd6f1N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4164
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4400,i,3210801877307184477,8078594481454001567,262144 --variations-seed-version --mojo-platform-channel-handle=4180 /prefetch:8
    1⤵
      PID:5064

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-2170637797-568393320-3232933035-1000\desktop.ini.tmp

      Filesize

      57KB

      MD5

      7acf28c75dc24fde807bdfbfc0c60cb2

      SHA1

      1a0b7bcf442d8a802ee317d232a3fbc74a784ef6

      SHA256

      c2ec344661b058e605b4d3bb268a023573f168d490e2adce12daacdd8c89319c

      SHA512

      ba4c9c1362c91c9266a2f03c3f940b7f25b147be4fd281a6dde596f9c917b4d056ef794e32e3d5e1a818a047c9223f92bc2db60fa65583bae2ac2dd66070ad60

    • C:\Program Files\7-Zip\7-zip.chm.tmp

      Filesize

      170KB

      MD5

      a1d2b2059641e4f54fc8074931234d11

      SHA1

      c41ad01dc2fe5315d7fe460e0f3ea0a3a3fae639

      SHA256

      8a0876860231d40f264d55f7024f235ad78bebdad6dc4be27b6b952b40edd8d9

      SHA512

      9a29704df1ea46b212966b938f589288d4b46a62c1694adb88a95e2bc48966e994ac854dd69b2d6066739a9b0f424e1d2c7325ae2f4d503aefa74133039126cb

    • memory/4164-0-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/4164-852-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB