Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    11-01-2025 21:19

General

  • Target

    c98e55830bface0e13ef7b1ba5f2e655d61c714f49a65441ffd0ff15b655e2b7N.exe

  • Size

    282KB

  • MD5

    24e967e8948317a18132b9698fb1b9f0

  • SHA1

    d037a9cffcba363b758ddc571ef8d8ea94d88d27

  • SHA256

    c98e55830bface0e13ef7b1ba5f2e655d61c714f49a65441ffd0ff15b655e2b7

  • SHA512

    c0b3f0f4197bb2d69b979d1a886a17d26215e5d995c41f46a361956d4450c8d4453e365d50465c33bbe610fe89294796db9c7ec8d135fd29633dc150322debd2

  • SSDEEP

    6144:KbEyyj2yAIJAEyyj2yAIJDyIjNDv0bNXkbvLl:WyAU8yAUDyIZGNXkbvLl

Malware Config

Signatures

  • Renames multiple (2151) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c98e55830bface0e13ef7b1ba5f2e655d61c714f49a65441ffd0ff15b655e2b7N.exe
    "C:\Users\Admin\AppData\Local\Temp\c98e55830bface0e13ef7b1ba5f2e655d61c714f49a65441ffd0ff15b655e2b7N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1163522206-1469769407-485553996-1000\desktop.ini.tmp

    Filesize

    283KB

    MD5

    0ba279beed8f42f0f1acbf2b3a0e3901

    SHA1

    a5217ab8f276f9f9a15f6d41711be610b54baf79

    SHA256

    0b842436e37b66476730f7d36e42270736bb90146ddad1a413b445b1f2c2b6af

    SHA512

    b87d384aa3c8c6eaa5cf3778945ecb5ff4a3dcb511293b134aeab2bc20d283d744c8c7f0d10372f822e3d17911e3bfb406c74646fcaa88776e8f61f8f2b7747b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    291KB

    MD5

    ae650d77d9604a89bcd2115e8e2a1c27

    SHA1

    ac139c7e728d17feb7512cffb9a1b3237ec3a6ab

    SHA256

    cc57488c902019752f0fc8e811df9832589c7d393db434fb0ef3f2a16ce021be

    SHA512

    23761723f28ffc31e06d697097ab9a9b0d0cb30b23dd69829cceef5a976c6e923855f8fbff06d695df820fc7cd97d3bdd17a80da823a2df0c154b2da60e9f0fb

  • memory/848-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/848-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB