Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/10/2024, 09:19

General

  • Target

    0f1238379c7570ee26f0bd05c5c09a8a30ac3fc7bcac940fc92dbdfdb5993f2aN.exe

  • Size

    58KB

  • MD5

    66517b06db1a72b3c056ed725bbd2590

  • SHA1

    37a0306dea9966d9d10333f5f0e0147693756fe6

  • SHA256

    0f1238379c7570ee26f0bd05c5c09a8a30ac3fc7bcac940fc92dbdfdb5993f2a

  • SHA512

    7b4de71863152895152b31e82dafa23dedd8256309dcf1a44d82c8124082796975286ed220428c7183d56ae65d09f2feedc88950e072fc1f0647d4dd53e7088d

  • SSDEEP

    768:/7BlpQpARFbhvEXBwzEXBwLtAc7Fc7m9n:/7ZQpApHom9n

Score
9/10

Malware Config

Signatures

  • Renames multiple (4623) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f1238379c7570ee26f0bd05c5c09a8a30ac3fc7bcac940fc92dbdfdb5993f2aN.exe
    "C:\Users\Admin\AppData\Local\Temp\0f1238379c7570ee26f0bd05c5c09a8a30ac3fc7bcac940fc92dbdfdb5993f2aN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1496
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4128,i,16316361669272684588,6171287487746154806,262144 --variations-seed-version --mojo-platform-channel-handle=4076 /prefetch:8
    1⤵
      PID:1460

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\$Recycle.Bin\S-1-5-21-2170637797-568393320-3232933035-1000\desktop.ini.tmp

            Filesize

            58KB

            MD5

            81c6a75a1ecef286e2797864d2a3703b

            SHA1

            ff234b89014894264bcd2c3a5bc8d054013d23fd

            SHA256

            25d10f9e991bb2480c428ec9085d151ea378bbdf119ba6cb9bd46914948d51b9

            SHA512

            690d9b4aadc4f32a664b075517456854339c94955f88b58e2382fa8f7dc7eab05b5c0f7ba17998a84fa574d949acd0229508d6338ec7ed2169bfb14785684673

          • C:\Program Files\7-Zip\7-zip.chm.tmp

            Filesize

            170KB

            MD5

            8c83f0d63cced23c4af8ca684177e387

            SHA1

            9ca9cd7dd0fe45db6cd33324502caf40345f4630

            SHA256

            cc7ba7222207d7517399952c235379606a3a7bf7f10b3e5b52a2f9b37e5a87a6

            SHA512

            55cf4c25dd43f24268487404e809767cf823979a093d44349057268a2ca6b35546a8ec7115020dd5166e456da50c671df478b9eab10398fd58d30e801d61d204

          • memory/1496-0-0x0000000000400000-0x0000000000408000-memory.dmp

            Filesize

            32KB

          • memory/1496-858-0x0000000000400000-0x0000000000408000-memory.dmp

            Filesize

            32KB