Analysis

  • max time kernel
    120s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2025 22:27

General

  • Target

    0d65d1926d70c09131e22ddd8e12ff35453893452d803870f68c28302f6b72ffN.exe

  • Size

    206KB

  • MD5

    557b7a67ee33cf645e31f5b61314aaa0

  • SHA1

    2a384a7efc763aa4290e229376bd0be7d46307a7

  • SHA256

    0d65d1926d70c09131e22ddd8e12ff35453893452d803870f68c28302f6b72ff

  • SHA512

    0c4198a68c23648faa0e59d905790913c428f294ffe6c74683da7434383e9f930e7df8f9d81b83c607c84c0abb90fceef7b462432aa4ab526f983bf64c79539c

  • SSDEEP

    3072:fny1tEyyj2yAeCgjJQWHIjN3tj6qnv0b2UrXkbvLiPK:KbEyyj2yAIJbIjNDv0bNXkbvLiPK

Malware Config

Signatures

  • Renames multiple (4088) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d65d1926d70c09131e22ddd8e12ff35453893452d803870f68c28302f6b72ffN.exe
    "C:\Users\Admin\AppData\Local\Temp\0d65d1926d70c09131e22ddd8e12ff35453893452d803870f68c28302f6b72ffN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:5068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3227495264-2217614367-4027411560-1000\desktop.ini.tmp

    Filesize

    206KB

    MD5

    e7b0482faa4a352d280307821438cdfc

    SHA1

    9e1656d6c58c1b9eb31d1922f070ebf0d99196b5

    SHA256

    71b5074f1a1065f6ef30f626d39dee8459adbf090c039aab0eb7cf745201dc88

    SHA512

    b338417b144a076e207dc87c7d4baec4fb74f49e2acb406e7c190a6ab462790423f572aeeab140a73b25bab9d0e7d53b4691ccaed5072655d75833b7cb2c121b

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    305KB

    MD5

    fb209e24b7028dd219952f384f37e659

    SHA1

    679ad68593e7708250aab2ba960d7a687feb9de6

    SHA256

    4bdc8e2295eaeedeed51257d146f10af128f1d4ccfdf53e2186498113c7cd03f

    SHA512

    2caf35d731fce451be9b1dafecc2430be2aa3294da361ef264943e2618b7ab5d4e5583f4ad46d63877f9459e41d3d7390e048d18673508afb965f454669679a0

  • memory/5068-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/5068-652-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB