Analysis

  • max time kernel
    120s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2025 22:23

General

  • Target

    18f1e5daba95fc4fec6575a47a18ec4d09cf1c0b2a8ee8ef68231b582e54ca00.exe

  • Size

    209KB

  • MD5

    92bd269cc41e1ab20db38a0628d5ff14

  • SHA1

    863b16ba4e97373fb691d15ac18b48bf3a6fe634

  • SHA256

    18f1e5daba95fc4fec6575a47a18ec4d09cf1c0b2a8ee8ef68231b582e54ca00

  • SHA512

    bf3abb5f30b9bd2d4cb31aa1835d3c93606d79634b4c4af324e727b9e91c7df53ad6a74422e3f4444b80097d2ffdd5cf1c9fc24b1e3e83c738bb2555fc1bf0c4

  • SSDEEP

    3072:fny1tEyyj2yAeCgjJQWHIjN3tj6qnv0b2UrXkbvLiPI:KbEyyj2yAIJbIjNDv0bNXkbvLiPI

Malware Config

Signatures

  • Renames multiple (3866) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\18f1e5daba95fc4fec6575a47a18ec4d09cf1c0b2a8ee8ef68231b582e54ca00.exe
    "C:\Users\Admin\AppData\Local\Temp\18f1e5daba95fc4fec6575a47a18ec4d09cf1c0b2a8ee8ef68231b582e54ca00.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3350944739-639801879-157714471-1000\desktop.ini.tmp

    Filesize

    210KB

    MD5

    0f6ddbc8b619dccd67ebe57855439c43

    SHA1

    612052ac211c565695a82c684b85619f70b222a9

    SHA256

    06a7de78503069437798e91fa017ac1749c3da800ee61c24a9b1dc3c12a3833d

    SHA512

    2bfc7425b70fa55cb86f41ff753a5dbd57ce38e7f692314e1dd893134c91511c5ab9577cb0548d852dc6d4f5b15fdd7c2303afba2a46ee7db095a11490f93144

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    308KB

    MD5

    dbd43dfd8a9c0b55f282d8472323c49d

    SHA1

    1300c63b0eb42255d9988a30936ac418b6881a3c

    SHA256

    dfff293eccc1959b37fe50c851142e51ce3e8df7c4a448ee1d58d15afe09b04f

    SHA512

    701fff17c8c41ad784859475c5b7d346ef3ffbf2f4153ee36921390d199341eacfa4c9e6715308679098c6609f7558dad837e3aa0d91182842f42ad34aa1a085

  • memory/3532-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3532-648-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB