Analysis

  • max time kernel
    120s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2025 22:33

General

  • Target

    7353817ef39a72b8fb6e8834186e10fb32b64850ddb4802f30e142cc2a5461ea.exe

  • Size

    603KB

  • MD5

    e99bc0167ed07e24a15710eefba736c5

  • SHA1

    439298dbb7920aefd5b09fb80a532dfb70910955

  • SHA256

    7353817ef39a72b8fb6e8834186e10fb32b64850ddb4802f30e142cc2a5461ea

  • SHA512

    7990036f437867473cd0391f2083e48ff73476bed852edc4d2bb1421e78df5dbbc6186165097c5af4d296b95b0da0f2825e7bc49741ff071198c2967935855ca

  • SSDEEP

    6144:KbESQvE6g9tTDVYbESQvE6g9tTDV8bESQvE6g9tTDVYbESQvE6g9tTDVN:dE7EXE7Ed

Malware Config

Signatures

  • Renames multiple (2234) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7353817ef39a72b8fb6e8834186e10fb32b64850ddb4802f30e142cc2a5461ea.exe
    "C:\Users\Admin\AppData\Local\Temp\7353817ef39a72b8fb6e8834186e10fb32b64850ddb4802f30e142cc2a5461ea.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3442511616-637977696-3186306149-1000\desktop.ini.tmp

    Filesize

    603KB

    MD5

    08686c2f98bbdeadc50ded70d9a5be84

    SHA1

    19436f7f458f6efae5f9a9ff9a90f112ba542994

    SHA256

    d227d58fc820cab5b94b3dbaa6ef10655024bd6f24b2fd067341805d4796f3de

    SHA512

    bd7f77adfa3325bc6b69e193407bae08edea39e1d5cc12619aa65b32099c8409c29413db1cf3f6283a28e7baf4e564955bc2c1625fe2be5ba104c63417917b17

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    702KB

    MD5

    cb3cdfcc6c2c7833936c6341aa112e00

    SHA1

    39203078e434e4532bc9bd5019d9f0fa9e9a57ca

    SHA256

    5b6b42748e2690241f592478961c0cb6aee1bb09f43dc5cdb9c7e30b3a768805

    SHA512

    89ee9881d378032f7465286b8178d0491d8a0bf25f937bef5cc06bb1ae3eb0f06097331a94b18a784b4e5e25a8c2b1334615389204fc449992e92b878165907c

  • memory/2884-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2884-426-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB