Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-01-2025 06:46

General

  • Target

    f6675d860eb508f9594eecf4bed0abc727db60b0785747bf0e68f524a66e80dc.exe

  • Size

    104KB

  • MD5

    fa0fd6bf894c2210e5230ca4cb217f31

  • SHA1

    aaea01362108dc29b711b7b48e741e591d1b60e5

  • SHA256

    f6675d860eb508f9594eecf4bed0abc727db60b0785747bf0e68f524a66e80dc

  • SHA512

    5dbfe965e35143809a63082a050fcc1345a024cf0b5b157b6cb25fcd517df8afdea0cd623bf41a165f2e854ddbb536a4e9d37a28de4e744e131b0ff3e15f57dc

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTBmRPsdj2hkAeCgI3i0CJS1Il+lMLN8/O+N8/OE:fny1tEyyj2yAeCgjJLN8/O+N8/OE

Malware Config

Signatures

  • Renames multiple (3139) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6675d860eb508f9594eecf4bed0abc727db60b0785747bf0e68f524a66e80dc.exe
    "C:\Users\Admin\AppData\Local\Temp\f6675d860eb508f9594eecf4bed0abc727db60b0785747bf0e68f524a66e80dc.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2872745919-2748461613-2989606286-1000\desktop.ini.tmp

    Filesize

    104KB

    MD5

    7fd547cd5bb27b8efc1a6ed965ed5cc2

    SHA1

    5847ea4ee97f00ef706dcfc8713090e52dd081e8

    SHA256

    11f13e9416f5875c053a4a8a19d8c3711f3b52d003ab7e4d2eaf9a084c89c085

    SHA512

    9b9db1c9f27abbeb26902c224553f89d536ecf7b8009616255c0d4431c9129ed101452ae082b74ac8b0782179c4a481dd301b7a23d0d0429932d9b404fa9cda5

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    113KB

    MD5

    0ba7e6d457766ff13370b4ab9ae3d8e2

    SHA1

    5bde5a52c9a1e0df07b7d56adf44f6d75b43c05e

    SHA256

    3a2b178fb3f57bae1f992400a0c6ba7e1d8836f45a42fe63e1f4d0d8ed4c00c1

    SHA512

    5d70aa959d0095759fd1c43d72a006d4cf479c118c1198a84aa3eefe90dd0e7f32d15da34343dad7c6a04563d7a31808785cf7804e93a04e2ae4a021a20d43df

  • memory/2688-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2688-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB