Analysis

  • max time kernel
    120s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/01/2025, 22:13

General

  • Target

    328cca04444ac4bb04a12c805fa6c42f538bce42fd9791139ea0639674441f1c.exe

  • Size

    189KB

  • MD5

    c8fa011bedc86df0d61825fd46fc88e9

  • SHA1

    142a0714754489a812dd40e153901ec20bc88936

  • SHA256

    328cca04444ac4bb04a12c805fa6c42f538bce42fd9791139ea0639674441f1c

  • SHA512

    3366019310eeb064c84549c8e575e1fa7c25becc00b82a5fa1b8f82d4075754358c3afd0725803e356fcb2675cdb71a773be5c66ddd3dda8e0f9e6ec910c3f72

  • SSDEEP

    3072:fny1tEyyj2yAeCgjJRDFDqrj9iMGfUSaOy9SnJUwFU+FUhFUeFUXFUqyqKRrpF6x:KbEyyj2yAIJg9iMGsSaOyiJ

Malware Config

Signatures

  • Renames multiple (4063) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\328cca04444ac4bb04a12c805fa6c42f538bce42fd9791139ea0639674441f1c.exe
    "C:\Users\Admin\AppData\Local\Temp\328cca04444ac4bb04a12c805fa6c42f538bce42fd9791139ea0639674441f1c.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4508

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3350944739-639801879-157714471-1000\desktop.ini.tmp

    Filesize

    189KB

    MD5

    8a085598664ea469c7fde514738cdadd

    SHA1

    52cde95d05f99d698588696224fb10f96c5e7112

    SHA256

    c62badf36ff76980882a8b833d98bfd40b2fc71a474731faadb634b3e1823bec

    SHA512

    4838e84a38fd5fa365b8b10fa80b7711517619ccfde5657acd178a6bb5ad19dde4ac63ca8ac26eb1996cb3fcd557f10381c6ba8a56153d6adf13347441bc795b

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    288KB

    MD5

    3768445582fcff47ab29efcfe63ce9f8

    SHA1

    43a9cdf288d219a4b4e526342a56a884526c4a20

    SHA256

    e4248f6669155436774fa3f0f793e4d5fd9b61f488dc9248b86aeb3cd06fdacf

    SHA512

    78db7666323d746315af6d9439f71322afe212d74517abecd830b15c21ca0004d13cc252ce5d9879d9026c175b3afb49a7bb3e3a5f9b63ebcdb59805f7e8f586

  • memory/4508-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4508-650-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB