Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/09/2024, 22:51

General

  • Target

    136a7700abbcce8c68912fe63727afd7002ff5b071252e008946fe577fce6b4cN.exe

  • Size

    35KB

  • MD5

    aeb0e9f6601ac0de3f72723f7073ca60

  • SHA1

    63b95e409c41505fe5bcd30b58b2aceefda45f9b

  • SHA256

    136a7700abbcce8c68912fe63727afd7002ff5b071252e008946fe577fce6b4c

  • SHA512

    262d63ad94791de0a87df7e03e2c4b8465194cbf3fe697c6746f716c0a671d09880d9cb44c3829f20ce6bb4a59c42b639a9397c83519cf67ff3e3d134bccbf62

  • SSDEEP

    384:GBt7Br5xjLfAgA71FbhvtPcniDvE10vE1ReM:W7BlpDpARFbhH3qeM

Score
9/10

Malware Config

Signatures

  • Renames multiple (4534) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\136a7700abbcce8c68912fe63727afd7002ff5b071252e008946fe577fce6b4cN.exe
    "C:\Users\Admin\AppData\Local\Temp\136a7700abbcce8c68912fe63727afd7002ff5b071252e008946fe577fce6b4cN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3688
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3848,i,2727319350781907497,7925939240893079607,262144 --variations-seed-version --mojo-platform-channel-handle=4240 /prefetch:8
    1⤵
      PID:1172

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-2170637797-568393320-3232933035-1000\desktop.ini.tmp

      Filesize

      35KB

      MD5

      5e30ee76e6d8d8688044173f2b6e0a98

      SHA1

      072651549d539f01d4346ef19769b602f1f7a60f

      SHA256

      b36ce5c8ed978af1789497775ab02e551ef9ab209bbf011d756236a65471b5c4

      SHA512

      6ea4e1e766cfa425bf15bb8dfa51c926aa3a765afa03792132b06fde16aba5192d4ff2b00e38b204f88a574db747fde91f695386000fc9f4079a69ff32cdce79

    • C:\Program Files\7-Zip\7-zip.chm.tmp

      Filesize

      147KB

      MD5

      3fdfbf2059920fafaa3978cc05105876

      SHA1

      7d3daadc1e2d6b550a7422cd3949211c9a55f2a0

      SHA256

      c20b6ef9ff0d8ef5e595c1d574b3dbcac707c5b4d7a631e9b74b4675bc4ebbd9

      SHA512

      9a8d72903a5f2a00228c5c73281f7c2961d01058b1cfe594bc07e3aa3ed35f404a70e6bfde54f97a55b3707b7c7d7231793f587998a52a36afb9d672de1aae15