Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-01-2025 21:25

General

  • Target

    81e13f2a1945db30b65bbe904a75f3652009d8fb1d20309dd48333c710308a80.exe

  • Size

    210KB

  • MD5

    536a1aa0e02e95af1701f6758a955a27

  • SHA1

    3e83738829fdc3e284ecbe81a05f2797b5d65e6d

  • SHA256

    81e13f2a1945db30b65bbe904a75f3652009d8fb1d20309dd48333c710308a80

  • SHA512

    bdaf2e75e8427220fb68a1c549c5239a396f7393e78fc669e55fec24d00bc5f062763a6b2dfb606bc65a1cfdd2b8467989bab8aa7dd971614e0599722a7388a0

  • SSDEEP

    3072:fny1tEyyj2yAeCgjJQWHIjN3tj6qnv0b2UrXkbvLiPP0:KbEyyj2yAIJbIjNDv0bNXkbvLiP8

Malware Config

Signatures

  • Renames multiple (2599) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\81e13f2a1945db30b65bbe904a75f3652009d8fb1d20309dd48333c710308a80.exe
    "C:\Users\Admin\AppData\Local\Temp\81e13f2a1945db30b65bbe904a75f3652009d8fb1d20309dd48333c710308a80.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2872745919-2748461613-2989606286-1000\desktop.ini.tmp

    Filesize

    210KB

    MD5

    47c6afdab06c24907d4dbf88e760f66f

    SHA1

    c71660518bd87a14b89ba8c06f454d20625421c3

    SHA256

    c03332bb5e9ffd58cb4ff25e52abc3262ef685719cf25756b407f627ff87fcf3

    SHA512

    2611660eb71667f9fa042f97276d4fd3ec9c93fdbe03fba735c85c616abd9f89facea8ed9bc7600b822b683a758e77a650bea61f19d16854c559c5e00224ed89

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    219KB

    MD5

    bf5af98b7ec6d3ca2c5b7262f3bcedef

    SHA1

    eb02ce9aa86a7c27ac0b5b7c0bf432d10555c65c

    SHA256

    38affe595ff2cbb752cbfc37399b6e64d23d55347e2b7344069aa2c275dfddde

    SHA512

    70fb5fefbf15108458aa4f1c82d66bf29e13ef4f5543bff1d8da01132c62a3487a5fb6d88d63d47d34736ffcb28ad96ecaa30429e3c620dc3ad9a29091580310

  • memory/1404-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1404-68-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB