Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2024 01:36

General

  • Target

    2a02cd370b38d88e5415972df7263071d228ebb62b1fe552fbe8f065848006b7N.exe

  • Size

    93KB

  • MD5

    b00090583c9b21ca7321807061c391d0

  • SHA1

    6aedc216adfa6399af8ed96848200bd8e29bac9c

  • SHA256

    2a02cd370b38d88e5415972df7263071d228ebb62b1fe552fbe8f065848006b7

  • SHA512

    38c45719e78a4b688777c4a1d4bb59ed491f643ec4b00e80c708e1acde870bb39dd64ae3ba561ffd61c86e9a5215b5eaac67e0434215bc654458fa858f5f9c93

  • SSDEEP

    1536:W7Z9pApQESOHepOHe8G+6E65dyGdykNdNBKgg0///x9zK/:69WpQE0zxg4ny

Score
9/10

Malware Config

Signatures

  • Renames multiple (4367) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a02cd370b38d88e5415972df7263071d228ebb62b1fe552fbe8f065848006b7N.exe
    "C:\Users\Admin\AppData\Local\Temp\2a02cd370b38d88e5415972df7263071d228ebb62b1fe552fbe8f065848006b7N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4720
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3908,i,8231329449558834090,4540802069600791165,262144 --variations-seed-version --mojo-platform-channel-handle=4128 /prefetch:8
    1⤵
      PID:536

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-2170637797-568393320-3232933035-1000\desktop.ini.tmp

      Filesize

      94KB

      MD5

      eff675fe156eb817cc082cad42e6661a

      SHA1

      42916eb302d58f4c7a7902c2ab30fac25a2a431f

      SHA256

      3318d44a1c6212252ff1bc8c5003ddea05a404d712448bdcb4c59009a750e721

      SHA512

      cacb1c2f96f9704b8d276bb22cb470586a471217fc0a67371713450b0c3a74345af97a4b4da9fc65412068d8d207477c9dd2f54df84511b1a6053510e12ed689

    • C:\Program Files\7-Zip\7-zip.chm.tmp

      Filesize

      206KB

      MD5

      8a08aae3d1bb24369fbb9efadbde470d

      SHA1

      362b867dec48910d1307e2a8cf391f7cf461c500

      SHA256

      7133a911d8dd0bc6a0051b4584d128788d70ec0d433991123c2ece13248c4da8

      SHA512

      a51c2b4815a846fcbeb38a530269dc1fc19c4d33292859d925bd3daa1c42a622b024ef7696f701099b3192df99a8931b54927965223b3e6954f312d68ee69392