Analysis

  • max time kernel
    119s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2025 21:53

General

  • Target

    0abb6edb0c7176b8949ec31958de67f8a5868acb342d5997bd4ad28348203620N.exe

  • Size

    62KB

  • MD5

    4a322cedf58eca107c85e665d3bd8490

  • SHA1

    e8694d62d37fddfb3ae2a87b557dfab4f333c11d

  • SHA256

    0abb6edb0c7176b8949ec31958de67f8a5868acb342d5997bd4ad28348203620

  • SHA512

    3a8d74f3593ed69c13ee00973b59ff911a4964d410f10478229c17f09055c53e812b365d386054f12c64c35e06441899d7c2a36bd3695ac32def13295420e1f8

  • SSDEEP

    768:a7BlpyqaFAK65euBT37CPKKDm7EJJcbQbf1Oti1JGBQOOiQJhATBmK4K0Jg0fXoy:a7ZyqaFAxTWbJJZENTBmR20fXo13rIAI

Malware Config

Signatures

  • Renames multiple (4363) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0abb6edb0c7176b8949ec31958de67f8a5868acb342d5997bd4ad28348203620N.exe
    "C:\Users\Admin\AppData\Local\Temp\0abb6edb0c7176b8949ec31958de67f8a5868acb342d5997bd4ad28348203620N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-493223053-2004649691-1575712786-1000\desktop.ini.tmp

    Filesize

    63KB

    MD5

    6c9a7d9bcbe3534f3b2e948b675cf670

    SHA1

    14b857dc2966ea8f5847cdb74d121e26b47d6638

    SHA256

    3788257a09d62d314a0ef0153f8820cc2cd176deebb61f4c259902fb17a43f53

    SHA512

    a97afad00a1d1cac1b475a309463d49fbc8e74fa1703318ddfd7304801b89dced3f8a4fc0e52c54f0b59e793f1cf10cab4700c7bffa15d52e82a076806f674c9

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    161KB

    MD5

    e3c5bc28aa1e6f57e9eedb44bdc78801

    SHA1

    a58fd545281a3ac18deec3bd80e195e38c656e0d

    SHA256

    e5b3b937efd56b72ea89544d2e331e741992baf33831832bd7ba9f652a5458a8

    SHA512

    40603cf1dafa3862ab359a21cafb84365686c61c0660b1e21f4e3169c9b85e3906149763154b3e71ff932bd1f0c0993b1875945d168d85ed2ffc72eb1f11f924

  • memory/4524-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4524-710-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB