Analysis

  • max time kernel
    107s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    11/01/2025, 21:25

General

  • Target

    b2d6dd95e0a2bc30892b8c4df883716aefbb793d28b7f130a6671c7b5b260f18N.exe

  • Size

    189KB

  • MD5

    9974dc1446fa5741ae9cfabac86fc0d0

  • SHA1

    e09ec2a456a958c010d156afa0fe56899cc7c118

  • SHA256

    b2d6dd95e0a2bc30892b8c4df883716aefbb793d28b7f130a6671c7b5b260f18

  • SHA512

    27927d6727491b5414dd13293b3097ddfe524be51a34bc7d9a3155f19bd4712b03195f2bb62fdb5774cf6cafff4017cccdcdfe0e450db29c0ad2fe02ee53c9fd

  • SSDEEP

    3072:htEyyj2yAeCgjJQWHIjN3tj6qnv0b2UrXkbvLiP+:fEyyj2yAIJbIjNDv0bNXkbvLiP+

Malware Config

Signatures

  • Renames multiple (2173) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b2d6dd95e0a2bc30892b8c4df883716aefbb793d28b7f130a6671c7b5b260f18N.exe
    "C:\Users\Admin\AppData\Local\Temp\b2d6dd95e0a2bc30892b8c4df883716aefbb793d28b7f130a6671c7b5b260f18N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2039016743-699959520-214465309-1000\desktop.ini.tmp

    Filesize

    189KB

    MD5

    a7ef9dc4dd03ac55ec42727bb8a67ab2

    SHA1

    be522bfdf1130531a2ca1e05db2d151a1d0322f7

    SHA256

    f3052d6d4f0696732e2112ff057814749c94d7148749448691494bd2e4057d75

    SHA512

    cc66c163d03a29796e60c7041df0f98bf0cf87d682d0e07cebe8b61097f05fa4240675f63e1f7df9040203c1507bdca4877c059dd8b8266e4dc34a333cbfbb0a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    198KB

    MD5

    ceb1ad966a0c22d4091a0f4b88c7e7c1

    SHA1

    6514daff2b22867c3a0ac24a9b12acf7797e5bdf

    SHA256

    285f105339f870bd579eb196f6abd0f908698a44cf4b9e114ad56a6c79b8126c

    SHA512

    b3e2b03878759edff1f150e5db762d48fd749162f52e4f7fb9a9696ef4e5e8fd34f3a70ff2bb3dd92a6962e7a8c4ffd9f7d67547de01cf2d56fcbb26ad6a7e97

  • memory/752-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/752-70-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB