Analysis

  • max time kernel
    119s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    11-01-2025 22:11

General

  • Target

    67b19649399797c8ccfd39af840b8603f7dffc82dbe2355299fa8bda0b029f7dN.exe

  • Size

    186KB

  • MD5

    4c5eb00d0a9b20d66732d6aad0d500f0

  • SHA1

    39516ca3651434c75d190a6714c2f964597b2f57

  • SHA256

    67b19649399797c8ccfd39af840b8603f7dffc82dbe2355299fa8bda0b029f7d

  • SHA512

    d1f194f0b00da5379801598cb7153f0de1926f1c7b856c56c9eab50ce9ec15ba684b790bc03d9caa10870b1e9d6438a98ae068c7961f88f8d79f0f8ad34e1f7a

  • SSDEEP

    3072:htEyyj2yAeCgjJQWHIjN3tj6qnv0b2UrXkbvLiPa:fEyyj2yAIJbIjNDv0bNXkbvLiPa

Malware Config

Signatures

  • Renames multiple (2691) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\67b19649399797c8ccfd39af840b8603f7dffc82dbe2355299fa8bda0b029f7dN.exe
    "C:\Users\Admin\AppData\Local\Temp\67b19649399797c8ccfd39af840b8603f7dffc82dbe2355299fa8bda0b029f7dN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1163522206-1469769407-485553996-1000\desktop.ini.tmp

    Filesize

    186KB

    MD5

    1c1f7f9074865249dd7b356672c354e6

    SHA1

    74e873af1a858f23817d2ddda93bb62f0c8cf6e0

    SHA256

    48c8900f4c038381ff62cce5091e30291aff3b696302d84353379e03aa0872c2

    SHA512

    cc638dcd6f94ae54bcf36786dda440e36089e5e129a01e5254ed7043596c7acc6a508a9b37e30e3b362397eb0c00e1b58d046e28cac01df51413bbaa9c33a09a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    195KB

    MD5

    8f2ced78c71d9a158a23ce46d2334f2a

    SHA1

    eb156b16ebaf94c1b6ea4c5cfdec31abf55d2f31

    SHA256

    fa232c50e51a7c8688d015cd03b3732e2ee70c7535f462323170d510f32e3ba6

    SHA512

    b35a2bbc51ba465a6359e8bb76fd052db1b32942fe64c8e20d64c2b903739a5ca50a56d5aca748e6546a79ac25ebeab69f4f8d819cd3410b837b0b1199189075

  • memory/1900-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1900-69-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB