Resubmissions

30/05/2025, 02:31

250530-czyqaahp2v 10

30/05/2025, 01:56

250530-ccw8ya1n12 10

Analysis

  • max time kernel
    62s
  • max time network
    39s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250502-en
  • resource tags

    arch:x64arch:x86image:win11-20250502-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    30/05/2025, 02:31

General

  • Target

    abc8e361a8acfeeaaa247945b4ca4e0f6378334e97f4bb6ea23f4951d3976b3f.exe

  • Size

    34KB

  • MD5

    fbc6a698b614ae61436e29d5356d06a4

  • SHA1

    54f2e91862cdcd92e1e3101889ca433197c5274d

  • SHA256

    abc8e361a8acfeeaaa247945b4ca4e0f6378334e97f4bb6ea23f4951d3976b3f

  • SHA512

    e1e2ea16a4e3d8126678274a61ee346bc76e9a3480d0744c896d7346e4feba6bcebde2f98cc8c3139cad99c40254fb30c79793a7acff614df991b1aa181b6296

  • SSDEEP

    768:uZ4FLz8ae+rOn8ae+rO+4500n1kJ00n1kNIyIZ:uGII+49101yIyIZ

Malware Config

Signatures

  • Cosmu

    Cosmu is a Windows worm written in C++.

  • Cosmu family
  • Detects Cosmu payload 1 IoCs

    Cosmu is a worm written in C++.

  • Renames multiple (2087) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\abc8e361a8acfeeaaa247945b4ca4e0f6378334e97f4bb6ea23f4951d3976b3f.exe
    "C:\Users\Admin\AppData\Local\Temp\abc8e361a8acfeeaaa247945b4ca4e0f6378334e97f4bb6ea23f4951d3976b3f.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3248

Network

        MITRE ATT&CK Enterprise v16

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1178639776-3244803473-3821071008-1000\desktop.ini.tmp

          Filesize

          34KB

          MD5

          8c36b99d3f367549fdae735bb6dcdb8b

          SHA1

          19b85f01c7c2f47316de8804ce30745626f847e9

          SHA256

          7cd04bcdfed9d591be84cb2f24231bcf0b2d77610cc2731af758127efba2a877

          SHA512

          88116117b45f48bf147cc7200218a9149e84f8360cd2bed7bea1851e146ba31a56f67ddb5ad6214af80e1edb6690606b3f5eb126dbbd33e0365e9b4f327ec3c7

        • C:\f8efe770fb160c3e4e\2010_x86.log.html.tmp

          Filesize

          114KB

          MD5

          e951c92e0922de3e67f12a1ce7a1c777

          SHA1

          4b825898cdcf67a68fad81cf47e2a0f27da999d6

          SHA256

          b9be90caf2772c842ad48485ce97d94a707c8b19a8a1b6a40dcd09ba15d586aa

          SHA512

          3b198ca7781ab9dd09f7311ad367c39f95bde376e0cffd11b68031db30730ecf84bbada66cfcff64b6d6bd05d409de054ee10f588759e15fc2becaa5fc1f8a38

        • memory/3248-1187-0x0000000000400000-0x0000000000407000-memory.dmp

          Filesize

          28KB