Analysis

  • max time kernel
    120s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2025 21:05

General

  • Target

    9138fb4aaff31208b9f95de4b0bbee927b4d71825748e0ee31ba72eb878d3f62N.exe

  • Size

    385KB

  • MD5

    09134e8a00b5f7957b4079802d0d2540

  • SHA1

    e04c654cc0afd52b9a3f3f0d3ba78e66e5f03d62

  • SHA256

    9138fb4aaff31208b9f95de4b0bbee927b4d71825748e0ee31ba72eb878d3f62

  • SHA512

    223c0cedb850d55a0f00b6c301ba8119952890a8440b9ebfc7326288d293a72f324e71c431c08aff985b239eed6da1b36e40387e1864389315cf1b3c966db740

  • SSDEEP

    6144:KbEyyj2yAIJbIjNDv0bNXkbvLiP+Eyyj2yAIJbIjNDv0bNXkbvLiPR:WyAUbIZGNXkbvLpyAUbIZGNXkbvLA

Malware Config

Signatures

  • Renames multiple (2772) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9138fb4aaff31208b9f95de4b0bbee927b4d71825748e0ee31ba72eb878d3f62N.exe
    "C:\Users\Admin\AppData\Local\Temp\9138fb4aaff31208b9f95de4b0bbee927b4d71825748e0ee31ba72eb878d3f62N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3442511616-637977696-3186306149-1000\desktop.ini.tmp

    Filesize

    385KB

    MD5

    7c7c8cbcbd4befc76f7f2084c7429288

    SHA1

    d6c6302e99adba4dbeb50c30ffd0206b23e6e194

    SHA256

    29b3b8f8101073ce224f1e7fbce5ba345aefb567ab022d4b4fbf3846dd34a211

    SHA512

    e5d910ef67f1b60367c4de16025f5b9774d2592f74d7a1d5c1785070c14e0c292897203c51594240bfb78d946d685983f6205e49a5f48a6fdf12c1069636a418

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    484KB

    MD5

    1cae2a3063708bf2663a1944421f7c9a

    SHA1

    5deaa869fbd89e83e04e5079fea67ef8baea6c96

    SHA256

    9cbf002d79ab6a26e8239ca91835670fbaf089c34a77859489cc2de94bcfc6e6

    SHA512

    d63fe0d9b18e0981d7a0448e8fe4c0853e176fa8c788addde8b8dfd3e6a2a69b2dbde73e2977a9da7871c88f01e739ce5da2653d94a2c1a13633d050d842a0c2

  • memory/1020-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1020-620-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB