Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-01-2025 21:09

General

  • Target

    20e7dce4d7017bd8eb02d413a50944cdb730ca6fed183edd329a06b296f691ab.exe

  • Size

    388KB

  • MD5

    da0f14119953ac4270081d51ac4a5e1b

  • SHA1

    a62bb58075063628e06ffb2da70f4ffa2267f88b

  • SHA256

    20e7dce4d7017bd8eb02d413a50944cdb730ca6fed183edd329a06b296f691ab

  • SHA512

    1f43cfc2a38f7251b54694a3687e2bf718d7decbf591732c91baa0783b4f9a0e0ac1c29ecccb81aa49404e579196f754b961a47df275b2d8d1943057292570ca

  • SSDEEP

    6144:KbEyyj2yAIJbIjNDv0bNXkbvLiP8Eyyj2yAIJbIjNDv0bNXkbvLiPe:WyAUbIZGNXkbvLJyAUbIZGNXkbvLp

Malware Config

Signatures

  • Renames multiple (2635) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\20e7dce4d7017bd8eb02d413a50944cdb730ca6fed183edd329a06b296f691ab.exe
    "C:\Users\Admin\AppData\Local\Temp\20e7dce4d7017bd8eb02d413a50944cdb730ca6fed183edd329a06b296f691ab.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4177215427-74451935-3209572229-1000\desktop.ini.tmp

    Filesize

    389KB

    MD5

    c870ce0f276eba38988a5ea68123a505

    SHA1

    b30c131d55af3ddb862387e405ab665ef402968d

    SHA256

    de021b668a4dbc93c09fac1903e0992896d85c1df64e9f48d9847ee845fbfc85

    SHA512

    eb3b85ef053f6f922caf73e8197fcdd1d4dbc7f70b78ccb26ea98ad6a276f75e4a5d15b58b288fbfd771ec547f2d86ff53703fd8ffb6589aea808e7d83448fb8

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    398KB

    MD5

    d6f80247a4595c76c24bf5700c0fe253

    SHA1

    66eb19ca88ce13ee408d957ea9f51b540c66ba7b

    SHA256

    64936373d30e91a513c5a5e6d832993ea4331438249eb6e3c3fc1a83dc1d63e9

    SHA512

    eb2306e3e024868c92f82782c4fe3c19a11fbc07bae229c0a7b0c33c18b6876cf3087d7d6f6d67c14382a5dfe76d148d10e71f96b4cd0f5e1fecb36ec2188e01

  • memory/2900-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2900-68-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB