Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 06:03

General

  • Target

    ad87063fcff289d9ace99453ab67c42005183e7ab1341ab615c2eaf9dcc587e1N.exe

  • Size

    69KB

  • MD5

    7c079312921ae5f192f29044c74acbb0

  • SHA1

    c880fdf157fd811b16ff8f6fabdeea3fc1567d7a

  • SHA256

    ad87063fcff289d9ace99453ab67c42005183e7ab1341ab615c2eaf9dcc587e1

  • SHA512

    1678c40367dcb3534f98142559996a3f0c6bc4b469d2abccb44906ee1945203968889409cb2438187271d45e363620a6a2bd4960a9fc740db71cd11a06328eee

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTNyl2Sm0mKRgZg0C44enYE/FXHFJV+C44enYE/FXHFJV6:fny1tE42ERgZgM

Malware Config

Signatures

  • Renames multiple (4532) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad87063fcff289d9ace99453ab67c42005183e7ab1341ab615c2eaf9dcc587e1N.exe
    "C:\Users\Admin\AppData\Local\Temp\ad87063fcff289d9ace99453ab67c42005183e7ab1341ab615c2eaf9dcc587e1N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3508
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4012,i,15336851255456239337,16379811035920490645,262144 --variations-seed-version --mojo-platform-channel-handle=3768 /prefetch:8
    1⤵
      PID:1232

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-2170637797-568393320-3232933035-1000\desktop.ini.tmp

      Filesize

      69KB

      MD5

      413989ba0e92671ab593748358087d71

      SHA1

      006af7b9ffb90e7ed0f9b69d3de5db0e4fdc05d2

      SHA256

      4fa1e218006e6f80284a30698eac7073f529e22980ef0d5c21e77a1ec932fd9a

      SHA512

      7b4beaf598169108d821bb0b78f302bc18a1a216834e12573405daa88135bb4c5d7f49516fae3788ddddc64814c99698d7f65b5c9038a8f1be44b850fceb42b4

    • C:\Program Files\7-Zip\7-zip.chm.tmp

      Filesize

      181KB

      MD5

      119659bf511e0d8eec4375eb5f4eef90

      SHA1

      94576ef13befe2ddef9a4660bced156bc70d0f42

      SHA256

      fd08953024d55f3a6f5dce4cfe1d78ef88a4b7f55d19e30b449d6fdc6fe544d4

      SHA512

      6c2177249d8c66e5dfa652bc01a591d224c0491d8a579968d682a96751c7cc73a5c8c4b38c9b7450c9052e8fa4dd95dd2257a491e0e9e783c5c366b276a6bb64

    • memory/3508-0-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/3508-860-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB