Analysis

  • max time kernel
    120s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2025 22:19

General

  • Target

    59ee6d70673c814a184354844a941f13703630c14f8be4de0f5d6652beb1a718.exe

  • Size

    149KB

  • MD5

    f282dbad0e98e548a1f4c80cda1b421f

  • SHA1

    c84bd4af981648c70b98b3f68825446a7ba3a81c

  • SHA256

    59ee6d70673c814a184354844a941f13703630c14f8be4de0f5d6652beb1a718

  • SHA512

    9d05ff4ee54a1133c3b91a51ea358a165b5378650e044ddde5e54aa924878aa3c7fbfee0c85545f999c3984e98c367ad036a81a94bd68937861d61334866b322

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTBHfiP3zHQtMH7Zf/FAxTWoJJZENTBHfiP3zHQtMhf51:fny1tESQ8ny1tESQk1

Malware Config

Signatures

  • Renames multiple (4209) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\59ee6d70673c814a184354844a941f13703630c14f8be4de0f5d6652beb1a718.exe
    "C:\Users\Admin\AppData\Local\Temp\59ee6d70673c814a184354844a941f13703630c14f8be4de0f5d6652beb1a718.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1456

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4089630652-1596403869-279772308-1000\desktop.ini.tmp

    Filesize

    149KB

    MD5

    76f4b8673276dc9cc0266f4c844c8370

    SHA1

    0a123c118f259c64546425f4ed0c0b313d9032c2

    SHA256

    0683cfe34eb7156045ee9ff8316dca474ac2e417ef1482c28d2f2cc930607e8f

    SHA512

    905adaa4575974375a1c5de4a9e32e4d77b6cfd281bf331f9b77ad5676690bf601c7b5931952a01176705716be18f3dfe62bd195b6822f16ad72b3d3e739dd5e

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    248KB

    MD5

    8d7f66916141292d6e54f2eb0f7e56e0

    SHA1

    7d096378bff8f3c5ac68871b1e84db2f60649371

    SHA256

    623c50ecfdd019f6e3f52a74482557c520402d66b1aada647cdeffb019ad26d2

    SHA512

    055272863b50a6b0b09cfc8dc370b230eec533e45f5343ed252cb34e7ff9f201bc0e5a40df6d6aa3f6cb4b1c62f597129c1fc900597cf402d5d2c6cd17b69896

  • memory/1456-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1456-658-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB