Analysis

  • max time kernel
    150s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    11/01/2025, 21:46

General

  • Target

    38907448cd02156b7cdbbfd1b67025fc1efcc89629d48c362acefc0d725421b9.exe

  • Size

    79KB

  • MD5

    98d45e579e4b113f184091f9af7d611d

  • SHA1

    cc3c91706d9be1ebbfff24344841b5b4e37cdce4

  • SHA256

    38907448cd02156b7cdbbfd1b67025fc1efcc89629d48c362acefc0d725421b9

  • SHA512

    8b43df502f2693fda471bbf9b3a9591a6869a6683239ba55c8b911956e4dfeab00e87dcd404e3ba863abb836f6418f0d1154b2c46b3c51752abc2755842fc12c

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATBHfBo8o3PV15RK:V7Zf/FAxTWoJJZENTBHfiP3zHQtMj8/

Malware Config

Signatures

  • Renames multiple (3622) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\38907448cd02156b7cdbbfd1b67025fc1efcc89629d48c362acefc0d725421b9.exe
    "C:\Users\Admin\AppData\Local\Temp\38907448cd02156b7cdbbfd1b67025fc1efcc89629d48c362acefc0d725421b9.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2116

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    80KB

    MD5

    04aeb6e17231b0211d392dd70568a490

    SHA1

    840ffee3620a4192ea4b0e033ad027f5c80177b5

    SHA256

    7631e1572c03f2e02f861dd343d1994803837024a097ce9f7a8cfe4f5e2f3d34

    SHA512

    d1a6c1fd42746ab9554a22116abcc8a3c955b75d0ccc6e79a35cdef2fe0871d1105e1d8606fccaf897bbce6e2804e1fc56269fbfb129a952c489d5d6ca09af4d

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    89KB

    MD5

    24e4acfffa20bee98b5410097c8969e2

    SHA1

    29876f1cd9fcac50f359eeb8a8ae4df092d7e38b

    SHA256

    3ef8d4f33f6afd21828de519b8acfa6cec330cd4b193c1b2236e98d48763a194

    SHA512

    3c373cf5b2b7ad5e7bab1758dd44d2a2e60b2977c692dcbc0768bd74c94de3edce9453dce84d3455f462cfcac3cb0d1d066816f95300b8201efb56fd9297f694

  • memory/2116-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2116-72-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB