Analysis

  • max time kernel
    120s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2025 21:28

General

  • Target

    29e870507f65136b06f3609c86c396ffa7f0d1b4d5c9576140cf285c42bfdad6.exe

  • Size

    165KB

  • MD5

    de3e45ddc99ced0bf53edca442147648

  • SHA1

    545426c5bfa80d4156c86217528612632686b3d9

  • SHA256

    29e870507f65136b06f3609c86c396ffa7f0d1b4d5c9576140cf285c42bfdad6

  • SHA512

    cebbe25862e947ccf8f89cd69a9e0f36348ac36efb0aee8b59dcd360245dcf0368c024190fad7699c002963dac5289953e61ba3aab9219c934ac9182f9164262

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTBHfiP3zHLe4pWHlPEXZzjUq3th5f6utM5vLNinVmWvMu0bD:fny1tEULVWHIjN3tj6qnv0b2UrXkbvLu

Malware Config

Signatures

  • Renames multiple (4289) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\29e870507f65136b06f3609c86c396ffa7f0d1b4d5c9576140cf285c42bfdad6.exe
    "C:\Users\Admin\AppData\Local\Temp\29e870507f65136b06f3609c86c396ffa7f0d1b4d5c9576140cf285c42bfdad6.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3380

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4050598569-1597076380-177084960-1000\desktop.ini.tmp

    Filesize

    166KB

    MD5

    7c09e451c485731b2f051821e81a02b1

    SHA1

    e97b9f267c7d7e220473e3a8bac61b77cc3af7b4

    SHA256

    bfe8b15372a60408c9807886bf15a80221d8f86e2c255510928b80a4c81ee552

    SHA512

    fdb2e792f6ba6707ff6f7608711e7003c146277385b86739b89b7ea181f650d3be067565f3de37446f12853a072e108d7cb807ab68705f878682aa3096d0e6a9

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    264KB

    MD5

    e805b396aaf02189606817efcf5bcd13

    SHA1

    ddc7c0ceefc2d0003f5a6c0e4f511ebcfa2d0a34

    SHA256

    9bab05d8ae0326f0a142e54a54ad9d6d4b411bdad8cac48a9e8f6000e856f324

    SHA512

    05fb7526e6230674182de71280c9c8745fe9839d76b51d312c5f4617dff079f14ede1168d14a4f31ceaf3e826e7f3c2d195ab18a14dd1d20ae37b2dadab4659a

  • memory/3380-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3380-666-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB