Analysis

  • max time kernel
    150s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 06:37

General

  • Target

    1313e2c58565595760ee965daef570a780ff49a27924ad85f48dd9d3a819547fN.exe

  • Size

    89KB

  • MD5

    7d91b231801f86da3edc75974ee43a80

  • SHA1

    5262e6874e861fd2c40b28e2abf284b493d469c4

  • SHA256

    1313e2c58565595760ee965daef570a780ff49a27924ad85f48dd9d3a819547f

  • SHA512

    6071f01e38328bbe627a6a246063f8be5f67d4417fc193288133a5e33a56d7f793af548631ec5031106362996382fe56ab0b224c30f074a9de09212aee27eb96

  • SSDEEP

    1536:W7Z+pApfGQ3y3RWvfmRfm9sKsSd5GT6SsDrgg:6+WpDfmRfmh2TSDrgg

Score
9/10

Malware Config

Signatures

  • Renames multiple (4865) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1313e2c58565595760ee965daef570a780ff49a27924ad85f48dd9d3a819547fN.exe
    "C:\Users\Admin\AppData\Local\Temp\1313e2c58565595760ee965daef570a780ff49a27924ad85f48dd9d3a819547fN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4016
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4396,i,10597648459838880772,16562651767759956329,262144 --variations-seed-version --mojo-platform-channel-handle=4164 /prefetch:8
    1⤵
      PID:4564

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-2170637797-568393320-3232933035-1000\desktop.ini.tmp

      Filesize

      90KB

      MD5

      f3b3359f07619bcf0ee1ea29b50d5fa9

      SHA1

      92056d4616d8135b3938761a9c1c5e354c7a7fcf

      SHA256

      bc7f9a356948501c865a4db074a1cb47a7499250ff9e94402267da2d04ee57e9

      SHA512

      a154c1b7e41d074db7c140586322efec8008bcc441439625da4ed3c3202ed7dc9fc0d31ea395d4653967e17fcda161709c8aab8e3db1a7490a0f0ff048c566ff

    • C:\Program Files\7-Zip\7-zip.chm.tmp

      Filesize

      202KB

      MD5

      1d65905849be39e61cc583a85cbeca2d

      SHA1

      4d57423efab899ef8d341c75ee2f90eaab4f9aa1

      SHA256

      afc867ae5581b0a8ea7728667eb619d617f2ebdbc3f89ca74f22ea9ba7d6dc90

      SHA512

      beb3e0cb34a0348f337b76b8f6a08c32af4c2689e274c486296a675c85b4b7efecaa1bdd4eba3c508ca1651f9c73e307f880d268134cfa8a8b4a10718c25ebb3