Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-01-2025 21:18

General

  • Target

    7196dbadd4fd7c5789df5087142cad50337e7ef63719e7c4c2f3be69670506e1.exe

  • Size

    111KB

  • MD5

    9ea8ff12641f26f994c2f2260a28a8ec

  • SHA1

    18366dfa5672990d99ba24ca0e71198be0891f03

  • SHA256

    7196dbadd4fd7c5789df5087142cad50337e7ef63719e7c4c2f3be69670506e1

  • SHA512

    8fa23dab2c31733c8f5daa7a09b77cbaee91a05e0831826d116c68c1131d81eeda98838a54948e9556c8f07645965907714878f10afccddf495a35b443caaf9f

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTBmRPsdj2hkAeCgI3i0CJS1Il+lM5QOVhFVh6Jb1Jb3rr:fny1tEyyj2yAeCgjJRDFDqrr

Malware Config

Signatures

  • Renames multiple (2893) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7196dbadd4fd7c5789df5087142cad50337e7ef63719e7c4c2f3be69670506e1.exe
    "C:\Users\Admin\AppData\Local\Temp\7196dbadd4fd7c5789df5087142cad50337e7ef63719e7c4c2f3be69670506e1.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-312935884-697965778-3955649944-1000\desktop.ini.tmp

    Filesize

    111KB

    MD5

    351c1350da0389e35788a2aac011e2ad

    SHA1

    f11782e3cfe6b33bb9c85c593fc3c41aa98932b7

    SHA256

    40f726ea8cba4be1c72bd19972370b6a1cfa35d294bbcaa667eabaacb93b8dc6

    SHA512

    a819d15048bbb739ed32b2d91275a27a8b68d71a11981f5cf9879c42b1490702c66e1757c424477641c6bc7fbdbe189e51fe4d15659ef5698c9394acc770b6a4

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    120KB

    MD5

    fe1a8ea3d98a7d2a25e3c5564b071956

    SHA1

    4d77b101fe142ecb277727dc4cd5d0afc6a48d9b

    SHA256

    69215c0c33cb4dadf09c3f9de51cd681fbda15763a7aebc0b1d50c167561fc65

    SHA512

    a6b39c9fdf43804095ec16ac098847321d322d7d09c885b3a55494c7d5ffbf7b940db18b484f680787c982d9ca10d8048e85a9c981adb5f3431790c70c9b04ef

  • memory/1764-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1764-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB