Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-01-2025 21:59

General

  • Target

    56ae3f4999d526f4deae493a7515da27567ec13e75c835317bdf02b20562faa0.exe

  • Size

    902KB

  • MD5

    ad7600493613bd94b8ca8686688670e2

  • SHA1

    8457d0e68f9fc79319d4349162920fad2ed03f54

  • SHA256

    56ae3f4999d526f4deae493a7515da27567ec13e75c835317bdf02b20562faa0

  • SHA512

    96e5a87cfbafed9a052aaa40b6245d904e0e521b7ef6e9352a4facef024027a46df64f3e54731c191b891036974feb83c7635a7ec5fce556ea8f61a0546267da

  • SSDEEP

    12288:94CxLLF7wm7J/MbpkgOFIen4nAlipjzSgpcC7nIxyeDEIse+wp:94Cx3FdJEbpLrJrHb+ZD1+4

Malware Config

Signatures

  • Renames multiple (670) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\56ae3f4999d526f4deae493a7515da27567ec13e75c835317bdf02b20562faa0.exe
    "C:\Users\Admin\AppData\Local\Temp\56ae3f4999d526f4deae493a7515da27567ec13e75c835317bdf02b20562faa0.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3063565911-2056067323-3330884624-1000\desktop.ini.tmp

    Filesize

    903KB

    MD5

    049d706dd5535fcd8ccc4d4e461d71f6

    SHA1

    b24882d9e8752a6662a1efe5bdb2f47d952ca422

    SHA256

    6fbafec092864c7a2d0675b1e5364b54b35bf0bacd5c7e740ea6fc03ef61fbb0

    SHA512

    de8af97bc17cc90ca7222568ec03ff69256d71ea35a66cad7efd3532dc1b7c0bf301fdbabca1795d6da3453a5ad03c85bee6486d92de8cbe1000f01287ab52a6

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    911KB

    MD5

    d067c623bb8429431c706473d0535355

    SHA1

    0f21a1def75b6b1757ccd29a1e830cb8d2a96313

    SHA256

    bdbd8347178dba38718330cd497c1e67648b01cc484a45afa6c0369268d8c7b8

    SHA512

    0e64e024391deae8490a5664ea33d1a805a37a0f7c3cbdd2d766c3b3e8ff58d359d78f5a285efa2373b31614043b66976685355b6379f4ffcc055a8e28bb95c5

  • memory/2480-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2480-64-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB