Analysis

  • max time kernel
    120s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2025 22:05

General

  • Target

    1199468fecdd5385d3aa872bedf7aa54d4e668ef29a80f5bc7850e2b3076c3b5.exe

  • Size

    196KB

  • MD5

    74e7afa2dc6387f780267b506770a061

  • SHA1

    a0dbcb3660d837ad8bb617396f15109797909eeb

  • SHA256

    1199468fecdd5385d3aa872bedf7aa54d4e668ef29a80f5bc7850e2b3076c3b5

  • SHA512

    633f2a9e95042284254492fe0ab1e879b46731115b27d68838a4a7cdd2b294c20ba3ac2f146a33a459ff8dbf5c17c0a81e339a9fe7af40ba2a43571f4c1cce55

  • SSDEEP

    3072:fny1tEyyj2yAeCgjJRDFDqratEyyj2yAeCgjJRDFDqrT:KbEyyj2yAIJ7Eyyj2yAIJA

Malware Config

Signatures

  • Renames multiple (3458) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1199468fecdd5385d3aa872bedf7aa54d4e668ef29a80f5bc7850e2b3076c3b5.exe
    "C:\Users\Admin\AppData\Local\Temp\1199468fecdd5385d3aa872bedf7aa54d4e668ef29a80f5bc7850e2b3076c3b5.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2878641211-696417878-3864914810-1000\desktop.ini.tmp

    Filesize

    196KB

    MD5

    88eca08baf25ed0a9157ac392c517126

    SHA1

    843ccb8ff6f6dbf95292161ad6da4a8abcd727c8

    SHA256

    1fdf96b27f56dd7e86a875f9fc3a1c9c213a9b5ecd6779a0327c1ccf3c5fc1b1

    SHA512

    de5668c1686a6b31833881e02b6aa2e4494e793695fd9a899786442104cac8c8ed60f8bd05be309458b4aa6ba88532438472bb85dddc1a7b253c1d281248a78f

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    295KB

    MD5

    dd0aad8b87eff3aaf996c528642e2d5a

    SHA1

    f1ea90edad00c53650a6518e9ab901667240d47b

    SHA256

    49b7cb944265c7825bbbd73905199cd12871665cbf9e83cba512d240a2b2e4b9

    SHA512

    0472d469919894a31a8d31c4eb8cb40a6ae5c59e04727969063aa98c72e71f0aba3272694c8d313556c23b2c4eab5676736d5f71757c3eb060df843201e74e87

  • memory/4884-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4884-644-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB