Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/09/2024, 13:19

General

  • Target

    093e1278b4faaf5b4fb2fd3485a0bc466359c42cccce849414b78f0a57ebe4f2N.exe

  • Size

    81KB

  • MD5

    009bcb4adab3c1a9e74553f181268710

  • SHA1

    eedaf007c61ef5aa196601467d3e975495a91228

  • SHA256

    093e1278b4faaf5b4fb2fd3485a0bc466359c42cccce849414b78f0a57ebe4f2

  • SHA512

    ce5706ae18668678337a4a206c5d7a7986d3be9c15816d9b245191f9b602f51a0f337d0500c387baba8fa03519d2874978a9d0557d5e49320744723796979f3d

  • SSDEEP

    1536:W7ZhA7pApMaxB4b0CYJ97lEVqNR7Yge+ejy0Wjy0WzYN:6e7WpMaxeb0CYJ97lEYNR73e+eGGS

Score
9/10

Malware Config

Signatures

  • Renames multiple (4377) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\093e1278b4faaf5b4fb2fd3485a0bc466359c42cccce849414b78f0a57ebe4f2N.exe
    "C:\Users\Admin\AppData\Local\Temp\093e1278b4faaf5b4fb2fd3485a0bc466359c42cccce849414b78f0a57ebe4f2N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1808
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3808,i,3387628439405076340,17957358341235678872,262144 --variations-seed-version --mojo-platform-channel-handle=4248 /prefetch:8
    1⤵
      PID:2252

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\$Recycle.Bin\S-1-5-21-2170637797-568393320-3232933035-1000\desktop.ini.tmp

            Filesize

            81KB

            MD5

            899f4ac623ea45965fa1f3ae45225503

            SHA1

            b31ef3f7579eff5d39ef0e564898aec9593b45fb

            SHA256

            7183ffacae6001a1c4f108799d53598a51c87f877c3c95bc7c9085520bcd0c8f

            SHA512

            dcfba2fbfcfca4b794124a09eac46ef5efd05bcdfe02a68fa614415edfdd9c96a5a04de20ef1e84d6ac6611a3415df7b273a86f27db8a9b4ab487ec53b9d52b0

          • C:\Program Files\7-Zip\7-zip.chm.tmp

            Filesize

            193KB

            MD5

            ad55220bad1cd5ef34c417c6e46cbd14

            SHA1

            c9e1f60e3d27cba5af55e3fbb38d5ff674ee1c5d

            SHA256

            b9661f3b87bf95e1674515ce0eee0cafa1d7c4ef87d40dacb3fbf760bb91949a

            SHA512

            a2a58b6df2f6efc0193b58acaa089499da21d4e7d61e346ee0d9fdc46a708cb384ddaff865fca2c29d18caf18e54cbb0eb7b1166f5ebf63cda27dd6227776fe1