Analysis

  • max time kernel
    119s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-01-2025 21:39

General

  • Target

    7a58f5e350735f2d7dc744ee1cbe66ed7ddf87ee06cb5bc0e563f39bdf56fd4e.exe

  • Size

    360KB

  • MD5

    c226c1bedb6312d12c18297a8175b90d

  • SHA1

    9dbc5557ecf9d601d853746d49fe7468866f5e73

  • SHA256

    7a58f5e350735f2d7dc744ee1cbe66ed7ddf87ee06cb5bc0e563f39bdf56fd4e

  • SHA512

    54135bace81be205168bb7db03550aafe15849da453f5dece406a2fc3f4bf7ce5be49f9b5da5684ea051e4b1643c2b05dc7136fa3d0be4d552264a046f390a10

  • SSDEEP

    6144:KbEyyj2yAIJAEyyj2yAIJDyIjNDv0bNXkbvL19iMGsSaOyi3:WyAU8yAUDyIZGNXkbvL19iMGsSaOyi3

Malware Config

Signatures

  • Renames multiple (2080) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a58f5e350735f2d7dc744ee1cbe66ed7ddf87ee06cb5bc0e563f39bdf56fd4e.exe
    "C:\Users\Admin\AppData\Local\Temp\7a58f5e350735f2d7dc744ee1cbe66ed7ddf87ee06cb5bc0e563f39bdf56fd4e.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini.tmp

    Filesize

    361KB

    MD5

    4ba57c2042bd58f795bd7a049b0895b4

    SHA1

    5330bc47628eff8970fad6ef286c5df6450852a9

    SHA256

    6810f59108e744b552d12416b844675b79315573a642c789b5bdba09970ce5ec

    SHA512

    a9904c438940b0fed9f4eb7ab61987eade8309d2d5866f14313c846dd54d74a04dea20da4df63eee98d6f2240f80aba285dcf4b1b310886d8a4ba2ca71606373

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    370KB

    MD5

    c96d067a4aa97b49f6ea69bd84e77351

    SHA1

    d49bc3c211447e1405e6ced5ed72118e6e1fac9a

    SHA256

    1abf1951f82e70b662fd0b572bf529cba34571d9092e5dc7530a0aeaea89860b

    SHA512

    cffc069cad923eda785440b1ee7735f232997f1c92033047bb4c692595ca1b23f6211df06aa03982b14aa3cd07c42711c4f3ef9cafcd03870f29067998965a32

  • memory/1696-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1696-68-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB