Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2024, 21:37

General

  • Target

    eed468d2b6d62c01acd89ada4d928c4b63d522715b50c34db6318dc7d906d7b2N.exe

  • Size

    47KB

  • MD5

    2b79df2623bfc54ec79da4ec29415a10

  • SHA1

    1b9577274313e928faa1e42e5bdc2a79a0a08ba1

  • SHA256

    eed468d2b6d62c01acd89ada4d928c4b63d522715b50c34db6318dc7d906d7b2

  • SHA512

    800e65f6f1256b22ce857269aa2634ef2056fa618bdff4ea18c575140f02ee0c48be0bd4ad24943beb772036cf19bd2be4848498a92141122e7e594ef20203a0

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfproFNFeK5c5jm7D:W7ZppApBULcfpHLcfpyD56Bm7D

Score
9/10

Malware Config

Signatures

  • Renames multiple (4633) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\eed468d2b6d62c01acd89ada4d928c4b63d522715b50c34db6318dc7d906d7b2N.exe
    "C:\Users\Admin\AppData\Local\Temp\eed468d2b6d62c01acd89ada4d928c4b63d522715b50c34db6318dc7d906d7b2N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1016
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4400,i,3239535018877284530,3457823197501312703,262144 --variations-seed-version --mojo-platform-channel-handle=4420 /prefetch:8
    1⤵
      PID:2076

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-2170637797-568393320-3232933035-1000\desktop.ini.tmp

      Filesize

      48KB

      MD5

      714b7002714b9d8284c26b5c9252a63b

      SHA1

      86af8dc75d6e502bcb384a987c75ace77451093e

      SHA256

      e64779513aacf187a7a3d0b7a35b9d6db67492edfbba71011019361b0ede78bd

      SHA512

      76c102d4c2b09ec77ad0337585f537550e769beb7a7cd0f8589a0de31051fbe36569762dc4498b8998df7b1aa006452d50b19e5a85cf39e0b8e35cf0771c45d3

    • C:\Program Files\7-Zip\7-zip.chm.tmp

      Filesize

      160KB

      MD5

      39f18617565d8afd55b352c0cae0d1d6

      SHA1

      ed3149c112cfe768fe92d1ab263a4a4e9fd03cd6

      SHA256

      5c0f7ba700e6a511fc47baa753f3c17fcbb7f8563c6734152c4b51a6414a1095

      SHA512

      3bcef8b67e0d6e78ac9e7cd4c719b0fde419bfc4ecb57d09570d942aa5e2cdbbf82f9027a125507c7dc1669107c400bc5feda12334594eb714bf5f001e3f2259