Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 05:29

General

  • Target

    92b2be2558024e1c81b6cd8cf16242d00684ef922da12e4cc569075a2e221b0aN.exe

  • Size

    89KB

  • MD5

    e7770076f30c93d7b599dc2b795b7590

  • SHA1

    0f0d05ab2056c569c0f2fef8e8dc203b31861601

  • SHA256

    92b2be2558024e1c81b6cd8cf16242d00684ef922da12e4cc569075a2e221b0a

  • SHA512

    cc4095581cf1a6e1fe13c99a291930de67523d213ce9dc40b607ab56b8ca0d0b841f284b1cfd68c11268c3300aad831ffa2f2b1bea2250a533eaad26a8a1585c

  • SSDEEP

    1536:W7ZppApUFpEhLfyBtPf50FWkFpPDze/qFsxEhLfyBtPf50FWkFpPDze/qFsAcEhO:6pWpUFpEhLfyBtPf50FWkFpPDze/qFsb

Score
9/10

Malware Config

Signatures

  • Renames multiple (4365) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\92b2be2558024e1c81b6cd8cf16242d00684ef922da12e4cc569075a2e221b0aN.exe
    "C:\Users\Admin\AppData\Local\Temp\92b2be2558024e1c81b6cd8cf16242d00684ef922da12e4cc569075a2e221b0aN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4888
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4236,i,10369132178352108590,11047993562598554317,262144 --variations-seed-version --mojo-platform-channel-handle=3808 /prefetch:8
    1⤵
      PID:460

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-2170637797-568393320-3232933035-1000\desktop.ini.tmp

      Filesize

      89KB

      MD5

      12a68178a6e4b7a9ef52687a6f004628

      SHA1

      083a68a933b4d31d96eb154068b124eb97d73202

      SHA256

      e0fec9058f812ab411c5febf6b770b36bc10c44d923df14ab9aaac7541afd7a9

      SHA512

      085ed3bc29202919fd9d1f070d0605d546155b258f474d2e422759993f029cf2b64b7918623ef9e487f7fca39a4b4870d2c780d06fd0ca951252ab48203b4d4d

    • C:\Program Files\7-Zip\7-zip.chm.tmp

      Filesize

      202KB

      MD5

      54b86bce7b3968ccc2d08eb47bfafe05

      SHA1

      f4c71cbb95702ae20a4aa393f553058f09843bf1

      SHA256

      4aeac065801cb91fa6d91ad6920e0db82d1cb29ad77c275ae5c123b354778bda

      SHA512

      3b8bced9f9dfd6e1044da64598256babb5263dcba7ba47b1f5d316fd790a983de59e2681381870af24eef670ee1d39d7265cf7ba10846f873683d5a25f009273