Analysis

  • max time kernel
    120s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/01/2025, 21:42

General

  • Target

    a880e57703e19c73e5aa6863d5befed20790f602ed32da6725f743f23fcc51baN.exe

  • Size

    173KB

  • MD5

    ee2406e065cf21d3974d6c94be04c280

  • SHA1

    f0279703931757432e8ddcf1ee016f37e2e445d1

  • SHA256

    a880e57703e19c73e5aa6863d5befed20790f602ed32da6725f743f23fcc51ba

  • SHA512

    eea44dd6ff1840bbfacbf54645f62e98147be393895931acab3f9bc951632cd5678e5506c1e1df4956f71c6b95355eeacc4df471bf6c470dec4c26fb561a208a

  • SSDEEP

    1536:V7Zf/FAxTWoJJ7Th9ko9kC7Zf/FAxTWoJJ7Th9ko9kzaG2Gz:fny199ko9kGny199ko9kzaG2Gz

Malware Config

Signatures

  • Renames multiple (3962) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a880e57703e19c73e5aa6863d5befed20790f602ed32da6725f743f23fcc51baN.exe
    "C:\Users\Admin\AppData\Local\Temp\a880e57703e19c73e5aa6863d5befed20790f602ed32da6725f743f23fcc51baN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2878641211-696417878-3864914810-1000\desktop.ini.tmp

    Filesize

    174KB

    MD5

    9c63a4da01647e0928b2cf5d0febf8f0

    SHA1

    d2881646c4c1cb8966a62b146ae8fdab9ef33333

    SHA256

    f1ecef729f561fda7c8b8bc570a1a590235b4d33815976dd0f924b04ee65e5ea

    SHA512

    e373a3d2c85e338dcf1f4890dc67bca26b2eb78cf2f655d3f14d1dc058bbd77a0e8144652ca23b4a855266bdbe19492eea442426df5a00cbb8564e6894f833ec

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    272KB

    MD5

    82a981e23baa8475a58430233ec24681

    SHA1

    a67b6049c2f0eddb91bbb6f49332cc15b0aa760a

    SHA256

    36e5bf08b36a21d4d9fd71d2842c10a23e93db08161c194ed5fd0c45e10cb7e8

    SHA512

    a4fd8da15eaed0e029deda21e991bd38689d483b74ebc0b2d85f6556ecaf34be195d7da3e74084fabe3f2c6d9e1489597ff2717c96ecd0eedac228f4ebff1f7b

  • memory/532-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/532-650-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB