Analysis

  • max time kernel
    120s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2025 21:19

General

  • Target

    c98e55830bface0e13ef7b1ba5f2e655d61c714f49a65441ffd0ff15b655e2b7N.exe

  • Size

    282KB

  • MD5

    24e967e8948317a18132b9698fb1b9f0

  • SHA1

    d037a9cffcba363b758ddc571ef8d8ea94d88d27

  • SHA256

    c98e55830bface0e13ef7b1ba5f2e655d61c714f49a65441ffd0ff15b655e2b7

  • SHA512

    c0b3f0f4197bb2d69b979d1a886a17d26215e5d995c41f46a361956d4450c8d4453e365d50465c33bbe610fe89294796db9c7ec8d135fd29633dc150322debd2

  • SSDEEP

    6144:KbEyyj2yAIJAEyyj2yAIJDyIjNDv0bNXkbvLl:WyAU8yAUDyIZGNXkbvLl

Malware Config

Signatures

  • Renames multiple (3831) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c98e55830bface0e13ef7b1ba5f2e655d61c714f49a65441ffd0ff15b655e2b7N.exe
    "C:\Users\Admin\AppData\Local\Temp\c98e55830bface0e13ef7b1ba5f2e655d61c714f49a65441ffd0ff15b655e2b7N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3227495264-2217614367-4027411560-1000\desktop.ini.tmp

    Filesize

    283KB

    MD5

    2eab453beccd9fa882cb65d9de9ee81f

    SHA1

    28cdf6ea16cdffa71c4b3431d3ce55fb20c828c4

    SHA256

    610315ca1ce5aa4cf2706021cf9129f47fe5e0e04bbd9a7d727915577d8796bc

    SHA512

    3430fb08abd57d580a97acf79c74fb5e8f330a9286a4b1543f3c58a84292d5c24d3c4e4fd7e1bc4f93387bfcb10d8d7ff23e403d9317e5c38b855febda4a3837

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    381KB

    MD5

    a610bacf8215e2a463f01f03242064b7

    SHA1

    78ffe590a944a519786427c9abde6f68325b83a1

    SHA256

    7fd40a5ef59b6c9db9cbde4f230edc96a4fb76fb2b2ea674ae6f198872812539

    SHA512

    c7387e1f0b27a37b2ab7592991d5bd28c80ddf7a71c4021e4a59f4a032180bab4d2a797d4965a4b202be105b331a35e5c5e57f01688988c9bbd6cf7a2c0cf022

  • memory/4356-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4356-652-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB