Analysis

  • max time kernel
    120s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2025 21:43

General

  • Target

    4b25b0e18d357e2b668ee41ddfdc524f4435ad2acf839474a49f8d5c14905638.exe

  • Size

    110KB

  • MD5

    96cabeb4ecfca427a63e62045bb90001

  • SHA1

    204fe8171018fbcdf72c25aa11720afaabbd6466

  • SHA256

    4b25b0e18d357e2b668ee41ddfdc524f4435ad2acf839474a49f8d5c14905638

  • SHA512

    f0c61fa7f2a862a4a47243c7d5ebdb24c8147665381228836c995e16f079bbfa5f2807e40459b8799db4bfd425de4c9a4d49b549a1e117eeb8c9245c0f52e937

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTBmRPsdj2hkAeCgI3i0CJS1Il+lMwVBVw6aq6av:fny1tEyyj2yAeCgjJwVBVw6aq6av

Malware Config

Signatures

  • Renames multiple (4530) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b25b0e18d357e2b668ee41ddfdc524f4435ad2acf839474a49f8d5c14905638.exe
    "C:\Users\Admin\AppData\Local\Temp\4b25b0e18d357e2b668ee41ddfdc524f4435ad2acf839474a49f8d5c14905638.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4050598569-1597076380-177084960-1000\desktop.ini.tmp

    Filesize

    111KB

    MD5

    65d6eda6257fc5e13925a54ec0febd5e

    SHA1

    19e6afbd3bc4ca9920bbdc789d4e382058416d2b

    SHA256

    cf8beedc710b9aa055187f11b38ae776cf651166c6bcda499be4bee2969251dc

    SHA512

    27fad24a828023532ff109549255230531d4a000115ee50db0fe69b7602a5a8ddd2ac4f22bb4831a470b4f42795846231bfafd53a11cbff651732e83c26643b0

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    210KB

    MD5

    cd44a9b0c37a299bda8bf7d21323eb2b

    SHA1

    34d9e324c4b703b2899b328c7ff1ec3c48ee6e63

    SHA256

    755e46037a71ffd0a2b23deffac8fae1f107eebff226b3bef891e813e38265c6

    SHA512

    5bbcf6ccf6ca88f6fbbda45342f462e4c67f6d9e1ff499605058a4543e4571c5d0b0d15d74e1d474ee96ab1d77f94a4b48c06c5c4cb78716f52eb6fed1ca26dd

  • memory/4588-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4588-694-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB