Analysis

  • max time kernel
    150s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 11:54

General

  • Target

    92b2be2558024e1c81b6cd8cf16242d00684ef922da12e4cc569075a2e221b0aN.exe

  • Size

    89KB

  • MD5

    e7770076f30c93d7b599dc2b795b7590

  • SHA1

    0f0d05ab2056c569c0f2fef8e8dc203b31861601

  • SHA256

    92b2be2558024e1c81b6cd8cf16242d00684ef922da12e4cc569075a2e221b0a

  • SHA512

    cc4095581cf1a6e1fe13c99a291930de67523d213ce9dc40b607ab56b8ca0d0b841f284b1cfd68c11268c3300aad831ffa2f2b1bea2250a533eaad26a8a1585c

  • SSDEEP

    1536:W7ZppApUFpEhLfyBtPf50FWkFpPDze/qFsxEhLfyBtPf50FWkFpPDze/qFsAcEhO:6pWpUFpEhLfyBtPf50FWkFpPDze/qFsb

Score
9/10

Malware Config

Signatures

  • Renames multiple (4867) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\92b2be2558024e1c81b6cd8cf16242d00684ef922da12e4cc569075a2e221b0aN.exe
    "C:\Users\Admin\AppData\Local\Temp\92b2be2558024e1c81b6cd8cf16242d00684ef922da12e4cc569075a2e221b0aN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1700
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4300,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=4384 /prefetch:8
    1⤵
      PID:5916

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\$Recycle.Bin\S-1-5-21-2170637797-568393320-3232933035-1000\desktop.ini.tmp

            Filesize

            89KB

            MD5

            4af38d6776c33c0b2c34ec62efb1a61f

            SHA1

            07bc95960331915df8681cf881d8ed05a3fd261d

            SHA256

            0759b4c0ffb8db715b720cc78c497d6b01adc9ee4529f948b86bfc279c718ae0

            SHA512

            6919ea1265b20abf0bc0fd0cfb7b7cb98f889ae7c810658d0792d88557152c4e0f95dc19bd42d6e843aa070119030d0824917970cb4c83c094c5a23c698717e5

          • C:\Program Files\7-Zip\7-zip.chm.tmp

            Filesize

            202KB

            MD5

            3ef8d102bb757813d6f323d1b0e0e27b

            SHA1

            4b145d577044b50ce675af2f909670f18192dad5

            SHA256

            be49e89f5aa20650b3afc850abb99046124d6e9a4d9bc0a215a85ba6196db729

            SHA512

            17065e8d84d32137e8143d715639b88bd249b005fe32f0b96631e4282e385a1a59c11b5866c0bc976deb7fd597c231fcb29b998101403de8e72e35730f753efb