Analysis

  • max time kernel
    120s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-01-2025 09:09

General

  • Target

    3d79a1b07b9a9723aabe041e5897256f079341d821a9d338533f5575282afeb2.exe

  • Size

    513KB

  • MD5

    23c0f1b5f04f12abbff000399c88161a

  • SHA1

    da0fb20d8730c63866be91df2781467db101ab76

  • SHA256

    3d79a1b07b9a9723aabe041e5897256f079341d821a9d338533f5575282afeb2

  • SHA512

    e7bea3f1a35a65256d62c73e9c8b3c48e22717b37d2ffa183dff7107005208792403d5ee32e4e82948658de920fb42fd20c03198a1a0a7c0e5bc7cddd8056149

  • SSDEEP

    12288:WyAUbIZGNXkbvL+yAUbIZGNXkbvLpIZGNXkbvLO:WmbIZaXkbvCmbIZaXkbv1IZaXkbvS

Malware Config

Signatures

  • Renames multiple (2353) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d79a1b07b9a9723aabe041e5897256f079341d821a9d338533f5575282afeb2.exe
    "C:\Users\Admin\AppData\Local\Temp\3d79a1b07b9a9723aabe041e5897256f079341d821a9d338533f5575282afeb2.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2045521122-590294423-3465680274-1000\desktop.ini.tmp

    Filesize

    513KB

    MD5

    4628390d332c90fc0538f3e34a9c0b46

    SHA1

    f421239e8301499c42358eabb697e5eb65fdf25a

    SHA256

    8866447e6c960d3b4a72791bf077c82fd5a4affcb408c0135ec92b8eee6ce55a

    SHA512

    c664bfd9185c824c080de938b7e7429e2a05cc694c1feacbfba4d6dcd061a96f70d2d68861099849d7168609f800fe1c3c4e092092066593fa521deb27a87559

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    612KB

    MD5

    14398ac3294bd88aba7eadbd9d5c6a1a

    SHA1

    19d87d0946750cec51faf6a05704bba4765b04e3

    SHA256

    449285725c4bd649b32efe2e3780787f3bc4ebbfc04fb3ed286ec2346cd39f87

    SHA512

    47d3be308c2e54e063bba262d14f221004723ae4ca6b42993949524376b1a6c302a775afebaf10d2bead00a22d7c8554c705ab8a1f1f6c1a055d86ec3930d9a2

  • memory/1524-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1524-448-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB