Analysis

  • max time kernel
    120s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/01/2025, 22:08

General

  • Target

    2e0d83498539a15085986370491efbce7b0da919a72536a5684ccf6b9d5fc9d5N.exe

  • Size

    184KB

  • MD5

    b19094ecf2beee214772e8e0cdb06f30

  • SHA1

    01118418d59bd3c68e4b6d713cecc7c476dd97d4

  • SHA256

    2e0d83498539a15085986370491efbce7b0da919a72536a5684ccf6b9d5fc9d5

  • SHA512

    133c1658f687c200fa85204fcbcf34deea098d70f4c78fd7a5245f676f66ca8540ab498ae765cd118ccca3c4ace138b3a4f765279fefb571584633c3ce97ee78

  • SSDEEP

    3072:htEyyj2yAeCgjJQWHIjN3tj6qnv0b2UrXkbvLiPV:fEyyj2yAIJbIjNDv0bNXkbvLiPV

Malware Config

Signatures

  • Renames multiple (4076) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e0d83498539a15085986370491efbce7b0da919a72536a5684ccf6b9d5fc9d5N.exe
    "C:\Users\Admin\AppData\Local\Temp\2e0d83498539a15085986370491efbce7b0da919a72536a5684ccf6b9d5fc9d5N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4089630652-1596403869-279772308-1000\desktop.ini.tmp

    Filesize

    184KB

    MD5

    30e5683e7aecfa6211d84360e550c134

    SHA1

    c433e3a27546c31c09146f32406256f82f769fd3

    SHA256

    629de08ade0d54eb66a93d5bf24b9ca6464c6f0f6d338a2fda405ecd53502f8b

    SHA512

    aa4cf7019e5850e82bd9fa1afcb0f2e275adb25250b1116e444a184c0b543838fe0be66128192ed62244c95c54570f85d509b4772e6b1a065ff6be539f53a45f

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    283KB

    MD5

    b272efdb8065fe58e30fe9471c3df051

    SHA1

    5657a50e69484851d5a2d3e99dd6feed657ef176

    SHA256

    b00bbc3f7b73cdb938b314b2f7e02805265a3abbd49a13b90b7267e78feb5759

    SHA512

    c1503d8f5a7e52319945a670b3325c7cbbf9fc9bee459251842f4bb6ae42e6e2e3554e800fd872f62ccb66e84f3f11796f21b3755bb345cd54b5df8c3cccebb8

  • memory/2172-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2172-658-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB