Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/01/2025, 22:04

General

  • Target

    80132bc08887deeb2dc138241236d8e327e8c904b61f87013bbcae19b66a0fadN.exe

  • Size

    386KB

  • MD5

    1ffb52b63f07303ebc22658e046f4ad0

  • SHA1

    c94a762051b089d87314c5ada5bf6717c6504dee

  • SHA256

    80132bc08887deeb2dc138241236d8e327e8c904b61f87013bbcae19b66a0fad

  • SHA512

    a9fe5fb486712f5d5b09974b919ac68dd6f7998b5964f75ea1379a80ba7ecc25f3db98965756da0fca75fc97d74108d1149826c1efc9d5685ac10c05cc60714f

  • SSDEEP

    6144:KbEyyj2yAIJbIjNDv0bNXkbvLiPpEyyj2yAIJbIjNDv0bNXkbvLiPx:WyAUbIZGNXkbvLcyAUbIZGNXkbvLO

Malware Config

Signatures

  • Renames multiple (1841) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\80132bc08887deeb2dc138241236d8e327e8c904b61f87013bbcae19b66a0fadN.exe
    "C:\Users\Admin\AppData\Local\Temp\80132bc08887deeb2dc138241236d8e327e8c904b61f87013bbcae19b66a0fadN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2340

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3533259084-2542256011-65585152-1000\desktop.ini.tmp

    Filesize

    386KB

    MD5

    a588a5c66de4230a2563e61b5e09d96f

    SHA1

    a506fe02bfb25008afd344afcfb42865d8e83d08

    SHA256

    9693175bf8da08233e2ccfb2492e0e40bc29663c513ee45014136bdf73376b75

    SHA512

    d65b3db5312e01a0c7b5b6cc2d5596c63aadf8c4604c021ea360f0971583d185b6b84d802af1ddb4ae052260bfdec6cbd474de75b6d702e66291287fc90168da

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    395KB

    MD5

    c85e8570950817c82cc7e6ba69b8598c

    SHA1

    a0598adc236187885a572bcb8d6acb771141d3d8

    SHA256

    2eb3af7a5697792549e95ed20a4a1d9dacd106702dccee5ee7ad3238b8c05b6e

    SHA512

    1bd4637a7bfbd416601ea781f913a4706a4148584a333f96018692d85e1e67cf2166f0cce4132e0279746ffd6238b085d1e0763c0acce23ee77fe31d0b072c3e

  • memory/2340-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2340-68-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB