Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    11-01-2025 22:29

General

  • Target

    21ca10281c183d21a598dc6cdb0f9111b1dfed05a89c0f825ada1613835389f4N.exe

  • Size

    881KB

  • MD5

    91c62d30217b77f63f5e306a3c0ab400

  • SHA1

    b7fb9c1175234b3d48d13702095099f58db45feb

  • SHA256

    21ca10281c183d21a598dc6cdb0f9111b1dfed05a89c0f825ada1613835389f4

  • SHA512

    cc24a31134f6a084bbf3b66079d06dc29ae4bb7d5542b84ad663b1ae5ff0ec7cc8a681a180da89c1eaa656d1914301566761e8f211cb21b75a89ed3f723adfcb

  • SSDEEP

    24576:rIZaXkbvYIZaXkbvlIZaXkbvYIZaXkbv1:ETGTZ

Malware Config

Signatures

  • Renames multiple (709) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\21ca10281c183d21a598dc6cdb0f9111b1dfed05a89c0f825ada1613835389f4N.exe
    "C:\Users\Admin\AppData\Local\Temp\21ca10281c183d21a598dc6cdb0f9111b1dfed05a89c0f825ada1613835389f4N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    881KB

    MD5

    d598ed168155272bcdfa3ea80000ffd9

    SHA1

    c534c7a4a968ac02b10e780987f800ec059dc304

    SHA256

    7971a0afb8238990b940e5c93559cac194f7c78481801b168bd6bdc28df1e872

    SHA512

    916328fdeb36e6730998d7b226f11d45f5d51e427c8b59966a58c93b2b065a50a8ac7f9d026d8836819725f3009c6b1f5d892df0a82a293408cf8d5d220d78f8

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    890KB

    MD5

    09b5617e6f4abdd0caebacefc67c7ec7

    SHA1

    b5195e453b8ccba970cc0ca9c94e0dfc8026b5a1

    SHA256

    98632ccd85a6ede513856b267ef95111479b68a1856465ce38312b6e43898def

    SHA512

    13a96c0c1ba00755cb38516b46cd221a472ee71228c3bef03146cc8c51287b0255963c78265d48490e4295f3a2efa816766cd730a28eeedfc3c7b460d476ff74

  • memory/1656-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1656-64-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB