Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-01-2025 21:46

General

  • Target

    c119aca718ef0ce2df42ac829ef50953b741c46856d9cb32693ce6ad7b64e310N.exe

  • Size

    388KB

  • MD5

    f1f77d7e7bb726ba4f847d5b6fbf91e0

  • SHA1

    5926e6a7f73d3d1bd1643c7b6bf4196fe29de157

  • SHA256

    c119aca718ef0ce2df42ac829ef50953b741c46856d9cb32693ce6ad7b64e310

  • SHA512

    c6204ecdc5ef8b1fcc835975b45e53cfaec527e56758bbd26813da77e9a367adc34fac1ab062a465bcb84640a0e73497b189cd58747bcd1baa53bdeb1533b389

  • SSDEEP

    6144:KbEyyj2yAIJbIjNDv0bNXkbvLiPOEyyj2yAIJbIjNDv0bNXkbvLiPR:WyAUbIZGNXkbvLLyAUbIZGNXkbvLK

Malware Config

Signatures

  • Renames multiple (1927) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c119aca718ef0ce2df42ac829ef50953b741c46856d9cb32693ce6ad7b64e310N.exe
    "C:\Users\Admin\AppData\Local\Temp\c119aca718ef0ce2df42ac829ef50953b741c46856d9cb32693ce6ad7b64e310N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2872745919-2748461613-2989606286-1000\desktop.ini.tmp

    Filesize

    389KB

    MD5

    e535ac7139b3a806fc62f02077810228

    SHA1

    6f1e57488f7a0a8b4027d8e5526bcd53be271ac7

    SHA256

    25dfe377554fb801de7e2d7c74ed36f718d800721904a1f2ab0402252a41a70d

    SHA512

    7bf0afd5902e35f13ec69c3b8529a14945b03ebb308283509e8e2c4053dfc3182073e58316a4a92a9d22d7f1b651211f07ae3d682421ac56c86232559b169b9f

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    398KB

    MD5

    7f2fc91ee6e22f689d15782521603dc6

    SHA1

    b9fc7c694e185e33460a7b3bbe0695d4bbdfdcd3

    SHA256

    d2ecaae5884ec515dc8fe3f30d3c5a90b20a7728f1fd6d14dcf9273121d1bc13

    SHA512

    ade783f43b5c4c01f13b02863098adc864c0d0782b1d3cea9f11e8be4fa008540a52df3c12fc353ebbf8891fc6bf2af9cd533aef47be48bc6514763faa915161

  • memory/2956-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2956-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB