Analysis

  • max time kernel
    120s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2025 06:46

General

  • Target

    f6675d860eb508f9594eecf4bed0abc727db60b0785747bf0e68f524a66e80dc.exe

  • Size

    104KB

  • MD5

    fa0fd6bf894c2210e5230ca4cb217f31

  • SHA1

    aaea01362108dc29b711b7b48e741e591d1b60e5

  • SHA256

    f6675d860eb508f9594eecf4bed0abc727db60b0785747bf0e68f524a66e80dc

  • SHA512

    5dbfe965e35143809a63082a050fcc1345a024cf0b5b157b6cb25fcd517df8afdea0cd623bf41a165f2e854ddbb536a4e9d37a28de4e744e131b0ff3e15f57dc

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTBmRPsdj2hkAeCgI3i0CJS1Il+lMLN8/O+N8/OE:fny1tEyyj2yAeCgjJLN8/O+N8/OE

Malware Config

Signatures

  • Renames multiple (4229) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6675d860eb508f9594eecf4bed0abc727db60b0785747bf0e68f524a66e80dc.exe
    "C:\Users\Admin\AppData\Local\Temp\f6675d860eb508f9594eecf4bed0abc727db60b0785747bf0e68f524a66e80dc.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2104

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2045521122-590294423-3465680274-1000\desktop.ini.tmp

    Filesize

    104KB

    MD5

    a4a573a49df6251812a69ded1108e8a1

    SHA1

    93f638790bb57e973d1ae0ec2578cedaa562b2dd

    SHA256

    9160b5b4a9388126e8314aad03e70020a25f658f6334de24e185e3ffe589d3e8

    SHA512

    722c510cacb5963e73ed4ea43a9d30623ed42d6412b57a8291be3f24474bcc7c1f0a5e7b0d6bfde9294713e742d34ccc4358489fee3728db763e9fb128974083

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    203KB

    MD5

    19144ee27f605b1220624996c79fb1bd

    SHA1

    17a5c9cace9a03dff7ad5bdadadc7a1e66f4679c

    SHA256

    3fff8bab1cd90d5b0572be0759291449ed8113dd713c5a9d0973fc1554af6ab7

    SHA512

    860714d55333f779813285dd568e12d644fc2730d9239c1d600bc8c0e343d66d0dfd18f26d3b5a2e0f20bdf2af75429445209f10ac95d4a820dd1bdbce0f111b

  • memory/2104-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2104-660-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB