Analysis

  • max time kernel
    150s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-10-2024 00:18

General

  • Target

    86b635ab9a4d1a03528fb8b0a790fc109329a4dca683de71b141e4cdc75cf001.exe

  • Size

    45KB

  • MD5

    976710d976a44df9e5133ffb90317683

  • SHA1

    501451de784ecf2064799a2e648c4b609b7e0bcf

  • SHA256

    86b635ab9a4d1a03528fb8b0a790fc109329a4dca683de71b141e4cdc75cf001

  • SHA512

    bff2eed745d7c8e403eed872df90122c1c2155c2b0ec46b011c50f33dbd736897b85b6324371ad5fe68bb1d0daa2285a559a404b987882435ca59528144be8a3

  • SSDEEP

    768:W7Blp+pARFbhBgnKLMWK9WKD2N2LSarSaV:W7Z+pAp2nKLRKIKqoLSarSaV

Score
9/10

Malware Config

Signatures

  • Renames multiple (5029) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\86b635ab9a4d1a03528fb8b0a790fc109329a4dca683de71b141e4cdc75cf001.exe
    "C:\Users\Admin\AppData\Local\Temp\86b635ab9a4d1a03528fb8b0a790fc109329a4dca683de71b141e4cdc75cf001.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1948
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4360,i,1602949858158667699,12464335823361976127,262144 --variations-seed-version --mojo-platform-channel-handle=1296 /prefetch:8
    1⤵
      PID:3032

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-2170637797-568393320-3232933035-1000\desktop.ini.tmp

      Filesize

      45KB

      MD5

      e65e5ba7279ab64acf6c1b48f3838540

      SHA1

      6a7b489b6dff2807f2e4855ae12db6fddd354910

      SHA256

      1a7f78586fecf532882f410906dbbd9942da32b0e4450ece3e9f632019b461e0

      SHA512

      c439b6a58438ff942b69a4364d6ce6f34f3c41cbfe08dc95d1e03feb18008ebe2e33ff3fc16d30b9a269f9a40b39fa8eb663e42b85ba346c568ec0efa6ed2573

    • C:\Program Files\7-Zip\7-zip.chm.tmp

      Filesize

      158KB

      MD5

      df42cae7980bfed4ebc2bbf5b533505b

      SHA1

      9fcf8ccf7e7aec52a665a1155409ef4cf8697370

      SHA256

      d1e4cb82e76e74b7ef261717bb4ee09ca5a3196c55298fdbaac80ab86808e70c

      SHA512

      a725f56fec15cf4708363e6f983986aeadad3544f74471aecc09512a659013d961297ce1a7ab13b3483149fbd50072dff6d6a08f12c6e37766038d6ab151e253