Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-01-2025 22:33

General

  • Target

    7353817ef39a72b8fb6e8834186e10fb32b64850ddb4802f30e142cc2a5461ea.exe

  • Size

    603KB

  • MD5

    e99bc0167ed07e24a15710eefba736c5

  • SHA1

    439298dbb7920aefd5b09fb80a532dfb70910955

  • SHA256

    7353817ef39a72b8fb6e8834186e10fb32b64850ddb4802f30e142cc2a5461ea

  • SHA512

    7990036f437867473cd0391f2083e48ff73476bed852edc4d2bb1421e78df5dbbc6186165097c5af4d296b95b0da0f2825e7bc49741ff071198c2967935855ca

  • SSDEEP

    6144:KbESQvE6g9tTDVYbESQvE6g9tTDV8bESQvE6g9tTDVYbESQvE6g9tTDVN:dE7EXE7Ed

Malware Config

Signatures

  • Renames multiple (1074) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7353817ef39a72b8fb6e8834186e10fb32b64850ddb4802f30e142cc2a5461ea.exe
    "C:\Users\Admin\AppData\Local\Temp\7353817ef39a72b8fb6e8834186e10fb32b64850ddb4802f30e142cc2a5461ea.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2124

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2872745919-2748461613-2989606286-1000\desktop.ini.tmp

    Filesize

    603KB

    MD5

    7af39a8f8f4cdcb2af73644428a62509

    SHA1

    7b869cd233ee7bb3883f577ba64522779ac25d06

    SHA256

    d1c712496c7c126686b67eddfc546e2f210178d3919b70224caa10854b8af4bc

    SHA512

    b6990520498cbdfc9a3a915ed7bd7d0fb0660982286432b2c78d2ee32a265c8c96baa1b1e676fd4ec5d5a22fed7f5a6c53e5dbe363e5e4bdb408b8ea1cfb7d2c

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    612KB

    MD5

    0be7259ffafcc771055dc1796a8c3407

    SHA1

    84a109d4e18b908f0c0c0b24274be7dcd7a1c294

    SHA256

    0c5fbf7f835d648a326f3eb3db24d942c92c2a1d911678b0543bd92af31b0d33

    SHA512

    f977cb035dceb617209400b8b37bda3220a19308297dac04c0113fd05a087175795fc5a2452f6b6e1acfcc9daf0da8aa541f386359aeacfd3689af895c440a41

  • memory/2124-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2124-62-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB