Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2025 21:09

General

  • Target

    20e7dce4d7017bd8eb02d413a50944cdb730ca6fed183edd329a06b296f691ab.exe

  • Size

    388KB

  • MD5

    da0f14119953ac4270081d51ac4a5e1b

  • SHA1

    a62bb58075063628e06ffb2da70f4ffa2267f88b

  • SHA256

    20e7dce4d7017bd8eb02d413a50944cdb730ca6fed183edd329a06b296f691ab

  • SHA512

    1f43cfc2a38f7251b54694a3687e2bf718d7decbf591732c91baa0783b4f9a0e0ac1c29ecccb81aa49404e579196f754b961a47df275b2d8d1943057292570ca

  • SSDEEP

    6144:KbEyyj2yAIJbIjNDv0bNXkbvLiP8Eyyj2yAIJbIjNDv0bNXkbvLiPe:WyAUbIZGNXkbvLJyAUbIZGNXkbvLp

Malware Config

Signatures

  • Renames multiple (4096) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\20e7dce4d7017bd8eb02d413a50944cdb730ca6fed183edd329a06b296f691ab.exe
    "C:\Users\Admin\AppData\Local\Temp\20e7dce4d7017bd8eb02d413a50944cdb730ca6fed183edd329a06b296f691ab.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3442511616-637977696-3186306149-1000\desktop.ini.tmp

    Filesize

    389KB

    MD5

    e893dd9586531f03fe96f5d5c106d93b

    SHA1

    12a032bbd3872ce428b8cb75adc3418aa975ac02

    SHA256

    363699e72fef8385bccae085ea606dc630da1217ee5ac4272f5753ebb7e7b02a

    SHA512

    eec315b7a759baf2588e311defcab937b6027225e69a6b47f994a3b6f96383789226888fb0c17dd88d46a9c4eaf4208183822f32b663a5ecd16dda9569440b41

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    487KB

    MD5

    299b21cbb4860bc5482ab783496a1cfe

    SHA1

    e7e8dbedf285f2c055f79d5967581ff9a171dbcd

    SHA256

    5680d26e1ab74e61252bee1d29dce447d3d0250b60eb801db5c71a34fc755925

    SHA512

    30f343b4a7a9b1ea55abd494d4e9a1a7a5fbebac071cb3e5bfe59779d6805070d32307aaeaba7a422248056d8a0196e595deed02ba847dc42fd6ca61debf7ecc

  • memory/1660-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1660-580-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB