Analysis

  • max time kernel
    120s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2025 21:59

General

  • Target

    56ae3f4999d526f4deae493a7515da27567ec13e75c835317bdf02b20562faa0.exe

  • Size

    902KB

  • MD5

    ad7600493613bd94b8ca8686688670e2

  • SHA1

    8457d0e68f9fc79319d4349162920fad2ed03f54

  • SHA256

    56ae3f4999d526f4deae493a7515da27567ec13e75c835317bdf02b20562faa0

  • SHA512

    96e5a87cfbafed9a052aaa40b6245d904e0e521b7ef6e9352a4facef024027a46df64f3e54731c191b891036974feb83c7635a7ec5fce556ea8f61a0546267da

  • SSDEEP

    12288:94CxLLF7wm7J/MbpkgOFIen4nAlipjzSgpcC7nIxyeDEIse+wp:94Cx3FdJEbpLrJrHb+ZD1+4

Malware Config

Signatures

  • Renames multiple (1854) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\56ae3f4999d526f4deae493a7515da27567ec13e75c835317bdf02b20562faa0.exe
    "C:\Users\Admin\AppData\Local\Temp\56ae3f4999d526f4deae493a7515da27567ec13e75c835317bdf02b20562faa0.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3442511616-637977696-3186306149-1000\desktop.ini.tmp

    Filesize

    903KB

    MD5

    5997d33bf267db56ea6aed03c3c1ad2a

    SHA1

    262a2ebc9579060b9b9c4d759d2baac325b62dea

    SHA256

    ed638bd5287f4f5c91944b2e60defaec33d8283e8bab2a91ac360c55f487faa7

    SHA512

    0742b79a3fbde84eb89049a25fb232ee238d4efa2f9c9f16831fe19043e1f91b5e3d3f14b27bb3c4e68e18c405c54d776cabb46e148e0e541fca5e5c013ffe08

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    1001KB

    MD5

    345981a21ed0c7b34a09c725e5bf366d

    SHA1

    7b48fbd906d5553ec8e723b0c72f0588f91b91b1

    SHA256

    e6d06ca49fef6d5536e5f9c7939f23efa0a581a0cc5aa7c2d440af135767bc50

    SHA512

    e7af01865d421147b73feaedb52429daac2d28ac91cd4427f8172b3c3011db9f120d33bd1dfb5127da565d4d43a46be1195600d95553b709d9377f75783da832

  • memory/4960-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4960-418-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB