Analysis

  • max time kernel
    120s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2025 21:43

General

  • Target

    8ca396acb6e472dace394c39cc609733778444b62f43b5a6af9e4942ce4c98d2N.exe

  • Size

    105KB

  • MD5

    f69cbade6dd91fb4fc9d0b45f007d180

  • SHA1

    f0200ddfdb21b44ebe98045b20408ab65243ca04

  • SHA256

    8ca396acb6e472dace394c39cc609733778444b62f43b5a6af9e4942ce4c98d2

  • SHA512

    f3de1b1a059c8b832c4cdbce7987ba321d2cadc9c7e22bfc8334699da40a537fb10a02658ea0d9f33ef65bc82fa8ac08236e018d0071f927e83172a6d73558ad

  • SSDEEP

    1536:a7ZyqaFAxTWbJJZENTBmRPsdj2hkAeCgI3i0CJS1Il+lM1hiC2CaS6:enay2tEyyj2yAeCgjJeS6

Malware Config

Signatures

  • Renames multiple (4401) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ca396acb6e472dace394c39cc609733778444b62f43b5a6af9e4942ce4c98d2N.exe
    "C:\Users\Admin\AppData\Local\Temp\8ca396acb6e472dace394c39cc609733778444b62f43b5a6af9e4942ce4c98d2N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2437139445-1151884604-3026847218-1000\desktop.ini.tmp

    Filesize

    106KB

    MD5

    3645ff6d1eb8e21f9917ed25f7d51317

    SHA1

    ca7b0f0cc889f5fb8304f3343a5fabdb8ccdadf7

    SHA256

    f3f545a3a7e88e33ff2463c750f12cdad2de9754a1a5014761996741fbf4c3d4

    SHA512

    a6bbdf40992583b44a809c6bc89ceabbc6c37d7c5fb2e23aef58518181073d457a9e34208cf93c7e11b14620eacd1b130ae5fc44f45f963a3fffb2e854b2937c

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    204KB

    MD5

    d13341dba26ef7dfa8dd4e8b0a91f2be

    SHA1

    dff234cd1e20d8bc53b822dd9de62a1734270131

    SHA256

    3c86ca08e31d4aef20aed469e1cf95915daf831a12b4cc706d347b3e3ff6be9b

    SHA512

    c505fa4bb94572c21b6931b347b92de9ce66faf8af5bac09706d980a1ab42b6e6dc158a572e1df2f8d838c58e71bcc5c6e554c90babb05ac3b3a90141997d912

  • memory/2360-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2360-718-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB