Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11-01-2025 22:27

General

  • Target

    0d65d1926d70c09131e22ddd8e12ff35453893452d803870f68c28302f6b72ffN.exe

  • Size

    206KB

  • MD5

    557b7a67ee33cf645e31f5b61314aaa0

  • SHA1

    2a384a7efc763aa4290e229376bd0be7d46307a7

  • SHA256

    0d65d1926d70c09131e22ddd8e12ff35453893452d803870f68c28302f6b72ff

  • SHA512

    0c4198a68c23648faa0e59d905790913c428f294ffe6c74683da7434383e9f930e7df8f9d81b83c607c84c0abb90fceef7b462432aa4ab526f983bf64c79539c

  • SSDEEP

    3072:fny1tEyyj2yAeCgjJQWHIjN3tj6qnv0b2UrXkbvLiPK:KbEyyj2yAIJbIjNDv0bNXkbvLiPK

Malware Config

Signatures

  • Renames multiple (2663) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d65d1926d70c09131e22ddd8e12ff35453893452d803870f68c28302f6b72ffN.exe
    "C:\Users\Admin\AppData\Local\Temp\0d65d1926d70c09131e22ddd8e12ff35453893452d803870f68c28302f6b72ffN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    206KB

    MD5

    44a319f3f40a1863572b45302185fa3a

    SHA1

    4c81e31249b6f37ed92a423084defefdd63dea4c

    SHA256

    21eee6b618870aae36ec9407983875e83830409856671d068422e144829ae353

    SHA512

    ab7667e139515c9a33e9674c35d48cae1d0211fa4a5dc536cff5bef5131b3b67123d251accb3a318e1cead98856db6f558324e4e08b7ce2c351704ecc66ed5a7

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    215KB

    MD5

    8cf584f9f35810b649c43c9500f4d53b

    SHA1

    381d75df05394f60adffea95e36de0d2a51b4ec4

    SHA256

    a54ca2e85f00b5b72af7da9137224340a7be60850ef368baed7d145ac874a405

    SHA512

    0ba639d8ba9e9fae33da63edb12aff7901f06dda46966986c167cb1d125784774d35e60726fe9b4e7870dd8e57691ffbfae527b8b11b0838a82731e6bea2fdbd

  • memory/2360-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2360-68-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB