Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    11/01/2025, 21:36

General

  • Target

    169a76fb11ecdb944ddc495bb8cf80992d57c7a920ba932a337fdb302e95671e.exe

  • Size

    184KB

  • MD5

    58dfcd37869ab90e69bbd8c5344549d3

  • SHA1

    d2f7b261313f2af56bc76d21ca347eb7755f8ac4

  • SHA256

    169a76fb11ecdb944ddc495bb8cf80992d57c7a920ba932a337fdb302e95671e

  • SHA512

    e4c0501c196ca52d7c0ebc78b2700ab0352069077b8ff8c1b2411b35d7cb6d2076f0a7e32c95697b8ce874143b0f15f6cc6e0d20546d9618205dec454eb9e50f

  • SSDEEP

    3072:htEyyj2yAeCgjJQWHIjN3tj6qnv0b2UrXkbvLiPW:fEyyj2yAIJbIjNDv0bNXkbvLiPW

Malware Config

Signatures

  • Renames multiple (2786) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\169a76fb11ecdb944ddc495bb8cf80992d57c7a920ba932a337fdb302e95671e.exe
    "C:\Users\Admin\AppData\Local\Temp\169a76fb11ecdb944ddc495bb8cf80992d57c7a920ba932a337fdb302e95671e.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2380

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    185KB

    MD5

    08d5eef8c02de97820f5da21575ce451

    SHA1

    a8fdd3873b01313b2fcfe9f8116ad6ac59b6b05a

    SHA256

    4ff7081eace3a326567e072e3f06964cb9a6dad6c0ee115d4920c956ccbd3d8f

    SHA512

    62a17aa32fbf762f3b8c2afe9a1162ef05df6a53c73e16107e6bbef64a83167bac66ef707edd0ad5079fe22b12f5a89a92d89ce37b33d9d7631577b429ff127b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    194KB

    MD5

    5431dfda30174169c7db357e30cc2169

    SHA1

    7a4186aae99e27764260ea7127db09e4b840d828

    SHA256

    eea5f30f60e5b09fbf894ae897b58c22d2e2c4447cbf629e31138cbd77d81920

    SHA512

    d4bfc523b6d552c7393cc9e19028c76e079f79da1f486e4407370179c5140493aa03bfe9c3b21b3efa0f80147707da2c2700f3959df9b9f0363292185f097f6f

  • memory/2380-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2380-70-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB