Analysis

  • max time kernel
    120s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2025 22:27

General

  • Target

    4cd28bce599f29d5dd195092e647a5675a838d5aa38bbbe3639f508a33e5144b.exe

  • Size

    364KB

  • MD5

    f2be745b64c74bee4f77624c418d2c03

  • SHA1

    854e2a37f2071dbd4b10664c9d4e7c3e7c89886f

  • SHA256

    4cd28bce599f29d5dd195092e647a5675a838d5aa38bbbe3639f508a33e5144b

  • SHA512

    86add2f9b8d03efca9d49c972402e79bee80040a6a054b98cd886a17c20b87b1eede63406c5cc322978c189952645ea4164523babb11486a55f6cc4b442182e5

  • SSDEEP

    6144:fEyyj2yAIJbIjNDv0bNXkbvLiPqEyyj2yAIJbIjNDv0bNXkbvLiPs:PyAUbIZGNXkbvL7yAUbIZGNXkbvL3

Malware Config

Signatures

  • Renames multiple (2826) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4cd28bce599f29d5dd195092e647a5675a838d5aa38bbbe3639f508a33e5144b.exe
    "C:\Users\Admin\AppData\Local\Temp\4cd28bce599f29d5dd195092e647a5675a838d5aa38bbbe3639f508a33e5144b.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4248

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3350944739-639801879-157714471-1000\desktop.ini.tmp

    Filesize

    364KB

    MD5

    ab6420d88e8581cdf091306e04817d1e

    SHA1

    26e1f7c680c21fde2f4f6c71bee55e342f706f17

    SHA256

    b6329f6bb764c8a5374c80998af6225a12e4a13307ae6d1fce17ca2ddb907532

    SHA512

    075c76695f3c916cccfd2f1dcb3bd1931b709940d31056f202629273d98111a6e03291dd310ec9195433c5c9612b5bf0fdc45b22ed53570b244b317d8f0e35a1

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    463KB

    MD5

    a7c8723e5a4d2c2f78eb30d71cfa757b

    SHA1

    172c33ffccce112e97ca15cd75608d2ef2f71ce6

    SHA256

    50d225f514d1afdcb7f1a24600c1b5403aba9658f9ab79c4c384d662f9e180b4

    SHA512

    bfa30ae70a935a5278686af028a89d638713fb259e9835f3c81b1c3b00253225c68935b5b680e37f4e692f52926acf222ecc6d46315757e4e5d115c06b9e2c19

  • memory/4248-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4248-563-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB