Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-01-2025 21:43

General

  • Target

    4b25b0e18d357e2b668ee41ddfdc524f4435ad2acf839474a49f8d5c14905638.exe

  • Size

    110KB

  • MD5

    96cabeb4ecfca427a63e62045bb90001

  • SHA1

    204fe8171018fbcdf72c25aa11720afaabbd6466

  • SHA256

    4b25b0e18d357e2b668ee41ddfdc524f4435ad2acf839474a49f8d5c14905638

  • SHA512

    f0c61fa7f2a862a4a47243c7d5ebdb24c8147665381228836c995e16f079bbfa5f2807e40459b8799db4bfd425de4c9a4d49b549a1e117eeb8c9245c0f52e937

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTBmRPsdj2hkAeCgI3i0CJS1Il+lMwVBVw6aq6av:fny1tEyyj2yAeCgjJwVBVw6aq6av

Malware Config

Signatures

  • Renames multiple (2853) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b25b0e18d357e2b668ee41ddfdc524f4435ad2acf839474a49f8d5c14905638.exe
    "C:\Users\Admin\AppData\Local\Temp\4b25b0e18d357e2b668ee41ddfdc524f4435ad2acf839474a49f8d5c14905638.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1846800975-3917212583-2893086201-1000\desktop.ini.tmp

    Filesize

    111KB

    MD5

    21b067678f0e57200b0e2b4258fa1b5b

    SHA1

    bee88702dc2774355e4d6411b7a752025a7c2fdb

    SHA256

    0a89d65ee022a0a0b171766bfaf5749efc54d13973d898d756917a7e14a1e993

    SHA512

    f8e7251cff5b9b810f7ed5ed078ef5ba4a4eca8397442516a55e2ef914b11f463709e77ca6b3dc370849bb3c2c99a0710983da59053eab04fddb61ba7f35301b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    120KB

    MD5

    6c478509518dc8a5186dcbc28dbcdb86

    SHA1

    90bb1d395889cd5a5cf8d2b58c067e12e69f5748

    SHA256

    19757823f6edf9c5dda884b77a6d031ea1026063dcc60e6472a3f1ee852ab49f

    SHA512

    998de2e70561289eebaf84b82e24b517c00e03b4e51b96c1bcf1013a70d91633f6467991aac81e84de32fd8e6c3b151850a4b0abd666435d94165ba7f7509a7b

  • memory/2088-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2088-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB