Analysis

  • max time kernel
    10s
  • max time network
    12s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-uk
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-uklocale:uk-uaos:windows10-2004-x64systemwindows
  • submitted
    04-10-2024 07:41

General

  • Target

    86e17aa882c690ede284f3e445439dfe589d8f36e31cbc09d102305499d5c498.exe

  • Size

    194KB

  • MD5

    ae811bd6440b425e6777f0ca001a9743

  • SHA1

    70902540ead269971e149eaff568fb17d04156af

  • SHA256

    86e17aa882c690ede284f3e445439dfe589d8f36e31cbc09d102305499d5c498

  • SHA512

    3617d8e77c221525125778cf64f2525136f7958766f5bed0fd7bfe00e7f738017d2840972acc628e4c3471b93cf6d52ccd619f49bdbbcff824c12cac8e1ea88e

  • SSDEEP

    3072:a6glyuxE4GsUPnliByocWepiHkZmlkQIQP6fo:a6gDBGpvEByocWeQwLAPm

Malware Config

Signatures

  • Renames multiple (628) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\86e17aa882c690ede284f3e445439dfe589d8f36e31cbc09d102305499d5c498.exe
    "C:\Users\Admin\AppData\Local\Temp\86e17aa882c690ede284f3e445439dfe589d8f36e31cbc09d102305499d5c498.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1148
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
      • Drops file in System32 directory
      PID:2156
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
    1⤵
      PID:5096

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-1194130065-3471212556-1656947724-1000\IIIIIIIIIII

      Filesize

      129B

      MD5

      d3e840a7156f83151e2e2fffb42176df

      SHA1

      f0608f60631e402815a13f679cab8f2b41ba1cf4

      SHA256

      5fd31f3a88b1460b6cc2721bdb212cd41749936cf2852f0dd0874b6515869ce4

      SHA512

      944fa559f62d3ca7ef338027f92d221872ca0240a4f53f1ffaea8467445bdd6e84fa2752956227efb6edfefd7ececff818780b565c47511dbe8abd4262b3f806

    • C:\kZd6jLIwz.README.txt

      Filesize

      449B

      MD5

      c2f46db865b0ba6ef8f9385cf458a56e

      SHA1

      0b2f94fcf38ef15f59bb86a3296b7da514b4ac4e

      SHA256

      c25759e6083dd4bf592a6da2063c45def5adc9a6ef2ed15820128a0d838f70fe

      SHA512

      9927b209ca26e3243fac9f003c6af7663ba84405346fbdb66c6f401387cd20ea3f99d63d0858ebdc76f2e6bc722d41e2a1f599bc6f7d97b0687dba95dea31b39

    • F:\$RECYCLE.BIN\S-1-5-21-1194130065-3471212556-1656947724-1000\DDDDDDDDDDD

      Filesize

      129B

      MD5

      fde0fe16ba0a57b939343a8e55a18603

      SHA1

      992e9408e45766b63b4a35823aa81b2afe5518d9

      SHA256

      6db4f0d68de5ff30e0f256dfdb879e9fcfa787ed9137b168b08e873340dc1570

      SHA512

      66711878784df5edef43ba78b3ccb2f76f54e0b62c4e75e23b7f15f99cf5a65563a311e67aaf38f338c4194ca61a52a46c9fd9e59b7fbe873b9e0d38c591222e

    • memory/1148-2-0x0000000002F00000-0x0000000002F10000-memory.dmp

      Filesize

      64KB

    • memory/1148-1-0x0000000002F00000-0x0000000002F10000-memory.dmp

      Filesize

      64KB

    • memory/1148-0-0x0000000002F00000-0x0000000002F10000-memory.dmp

      Filesize

      64KB

    • memory/1148-2811-0x0000000002F00000-0x0000000002F10000-memory.dmp

      Filesize

      64KB

    • memory/1148-2812-0x0000000002F00000-0x0000000002F10000-memory.dmp

      Filesize

      64KB

    • memory/1148-2813-0x0000000002F00000-0x0000000002F10000-memory.dmp

      Filesize

      64KB