Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    11-01-2025 21:35

General

  • Target

    27a1ada69c03ecc4a0b37aa82d539a47e2221a31b3c989c79bebb830b4c98f35.exe

  • Size

    95KB

  • MD5

    6481ca0040f505ede54eb7bdb7c5d764

  • SHA1

    8b820e1df79dd3695e6e5b5330dd52a17160c700

  • SHA256

    27a1ada69c03ecc4a0b37aa82d539a47e2221a31b3c989c79bebb830b4c98f35

  • SHA512

    e9643adb07a1b7cb81cead2907e157a92e7672e46ad61db18966c18f373660db28e9ff892da3d9a9a74e21b0f23a22e03058fd5850700e852fb229f533fa0ca6

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcwBcCBcw/tio/ti3c7Fc7NS:V7Zf/FAxTWoJJ7TTQoQmoNC4CXkty

Malware Config

Signatures

  • Renames multiple (3433) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\27a1ada69c03ecc4a0b37aa82d539a47e2221a31b3c989c79bebb830b4c98f35.exe
    "C:\Users\Admin\AppData\Local\Temp\27a1ada69c03ecc4a0b37aa82d539a47e2221a31b3c989c79bebb830b4c98f35.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1304

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1163522206-1469769407-485553996-1000\desktop.ini.tmp

    Filesize

    95KB

    MD5

    0e0e63c02f0af8068634cd14a314094f

    SHA1

    aabeffbe4b3120f53a8f94ee808bced325b0f877

    SHA256

    f45a67817066c8f464fe5dabdc0a219f1fd4a3ccc1f7ad84ce292ccbed19d0a2

    SHA512

    11cdfcf563f4031c6d4253a8a62a1fbca9548ce57c23f7177be5fa14bb7eaec14014b8d5b7406dae5ebfb92ba87f24667707bc407ef1874ff87b3264c55d2e2d

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    104KB

    MD5

    c4f26583b8c5dd6d9063e9b30c7ee6c5

    SHA1

    882733a7e6f495f89a3ab4cb484b1dc3e9d0761e

    SHA256

    5f18385d227408b0760edd8427c84c3c89a89df03b85d56d0727d67dde6474c7

    SHA512

    d4f20d0ab9d3ac766f1d33319cb104e1669bcaa26970eb2630f7675f49c10d3e86609fb3cf96e640e636968f1ca877d268263d3c48d7ae16313163525f974eba

  • memory/1304-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1304-68-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB