Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-01-2025 09:09

General

  • Target

    3d79a1b07b9a9723aabe041e5897256f079341d821a9d338533f5575282afeb2.exe

  • Size

    513KB

  • MD5

    23c0f1b5f04f12abbff000399c88161a

  • SHA1

    da0fb20d8730c63866be91df2781467db101ab76

  • SHA256

    3d79a1b07b9a9723aabe041e5897256f079341d821a9d338533f5575282afeb2

  • SHA512

    e7bea3f1a35a65256d62c73e9c8b3c48e22717b37d2ffa183dff7107005208792403d5ee32e4e82948658de920fb42fd20c03198a1a0a7c0e5bc7cddd8056149

  • SSDEEP

    12288:WyAUbIZGNXkbvL+yAUbIZGNXkbvLpIZGNXkbvLO:WmbIZaXkbvCmbIZaXkbv1IZaXkbvS

Malware Config

Signatures

  • Renames multiple (1474) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d79a1b07b9a9723aabe041e5897256f079341d821a9d338533f5575282afeb2.exe
    "C:\Users\Admin\AppData\Local\Temp\3d79a1b07b9a9723aabe041e5897256f079341d821a9d338533f5575282afeb2.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3063565911-2056067323-3330884624-1000\desktop.ini.tmp

    Filesize

    513KB

    MD5

    e4777c23d633ff9e7c24cf9fdf6e08f0

    SHA1

    6336004909a11bd78d6c9725dff9243629b3a329

    SHA256

    ac4d30e871f6ac8635a493cb1f6e91f33c773c72082103fbd9081a6667329a6c

    SHA512

    24cae1c770aad05460e0a2e056b587ec8d1364368cc8fbef49dd5a8f84879200def22d94262074b130fc9bc3dacee70bbeaa24d5be9c613f13d188b40ddf9407

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    522KB

    MD5

    ad6b2c4e6629efc8a39d1d4de67d128f

    SHA1

    6ad353a6e0d57970336c38192456366dcea1a8c9

    SHA256

    bdd60b976aad5356a701c70fe32eabd153458277dcd1b953a9913007144ff2cc

    SHA512

    21780d5b3d7fb848ea2e1e789aba07b243b3e0e67ba161bf59377206a27e17e74042287013fd2407902077fea3b6162500facfbd360ac80240110d3972d5db6f

  • memory/1620-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1620-68-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB