Analysis

  • max time kernel
    120s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    11-01-2025 22:05

General

  • Target

    1199468fecdd5385d3aa872bedf7aa54d4e668ef29a80f5bc7850e2b3076c3b5.exe

  • Size

    196KB

  • MD5

    74e7afa2dc6387f780267b506770a061

  • SHA1

    a0dbcb3660d837ad8bb617396f15109797909eeb

  • SHA256

    1199468fecdd5385d3aa872bedf7aa54d4e668ef29a80f5bc7850e2b3076c3b5

  • SHA512

    633f2a9e95042284254492fe0ab1e879b46731115b27d68838a4a7cdd2b294c20ba3ac2f146a33a459ff8dbf5c17c0a81e339a9fe7af40ba2a43571f4c1cce55

  • SSDEEP

    3072:fny1tEyyj2yAeCgjJRDFDqratEyyj2yAeCgjJRDFDqrT:KbEyyj2yAIJ7Eyyj2yAIJA

Malware Config

Signatures

  • Renames multiple (228) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1199468fecdd5385d3aa872bedf7aa54d4e668ef29a80f5bc7850e2b3076c3b5.exe
    "C:\Users\Admin\AppData\Local\Temp\1199468fecdd5385d3aa872bedf7aa54d4e668ef29a80f5bc7850e2b3076c3b5.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2248

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3692679935-4019334568-335155002-1000\desktop.ini.tmp

    Filesize

    196KB

    MD5

    11011e5f487fa6c74c38669ec96c9532

    SHA1

    d1dd14eb53ed8c9c091bb0e4f5442b158922bdba

    SHA256

    907237c5c49c7adbbc8c2fa369bbc3a0ffd053b1714365e5cf0ad63e53a6f8c1

    SHA512

    9a3c84b5b7ec5ee15881691aee47bea18b54a211de4f21eaa7155c6081c4c943981400c6e0402534d3005bc691a0c6987537f1d5b8d49b7344b2c8c498d09fad

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    205KB

    MD5

    d8cb9a50061cc4b22a37c92e731e1718

    SHA1

    b9dfb1f4dd371f07359e065c08f2a603c923a0b8

    SHA256

    42d54b5548ee4a660386a92261ba08305c0f1c39b28349e771e0a9990790605d

    SHA512

    c8acbe61cffac6619e124413e422e5fe61592f6cc8763173b1062c1f4e6c82b3986331fbfba22e283e1fa0252ee9fa55b9a6e4155e0c14bcc2a4f43520f9a6ea

  • memory/2248-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2248-26-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB