Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/01/2025, 22:08

General

  • Target

    2e0d83498539a15085986370491efbce7b0da919a72536a5684ccf6b9d5fc9d5N.exe

  • Size

    184KB

  • MD5

    b19094ecf2beee214772e8e0cdb06f30

  • SHA1

    01118418d59bd3c68e4b6d713cecc7c476dd97d4

  • SHA256

    2e0d83498539a15085986370491efbce7b0da919a72536a5684ccf6b9d5fc9d5

  • SHA512

    133c1658f687c200fa85204fcbcf34deea098d70f4c78fd7a5245f676f66ca8540ab498ae765cd118ccca3c4ace138b3a4f765279fefb571584633c3ce97ee78

  • SSDEEP

    3072:htEyyj2yAeCgjJQWHIjN3tj6qnv0b2UrXkbvLiPV:fEyyj2yAIJbIjNDv0bNXkbvLiPV

Malware Config

Signatures

  • Renames multiple (2693) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e0d83498539a15085986370491efbce7b0da919a72536a5684ccf6b9d5fc9d5N.exe
    "C:\Users\Admin\AppData\Local\Temp\2e0d83498539a15085986370491efbce7b0da919a72536a5684ccf6b9d5fc9d5N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2180

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1846800975-3917212583-2893086201-1000\desktop.ini.tmp

    Filesize

    184KB

    MD5

    80bab854a23177416d34a9912b9e5e36

    SHA1

    7621376f5ab0a8c03e8e1735a12d565c7472018c

    SHA256

    40118fc1a66ce895e454c51105bb8a77990160655d254805591543f62f098ce4

    SHA512

    64b27525db2671d25af9a973e19508f4f5371cdf5e66a2ee9635df60de74d419d0be8e1f1e2c6ac1655370d025057e8e16c45ada5702d8246c1e77353fc8327f

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    193KB

    MD5

    69d033b988a62570ab20e44ef9664112

    SHA1

    3fc8afc3026e8f5d910c3d16cf440a6d2fee53e4

    SHA256

    b4bb2a2888d4c41e9c92683c55f24d7dae037dc07197a28a72bf55087bf5a29d

    SHA512

    4e158e3f9cabac24c8a075ad170af4d876bc5ffa1911c74e4220d6ace0511b01f58589171a9ad79590c221efeb95eeedfa0b95d888de11334255c910e011930f

  • memory/2180-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2180-70-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB