Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-01-2025 09:13

General

  • Target

    af28bc2c2453388c4bf7cb8eeb3f7c44bfce718015fff693724e28b5858eedcd.exe

  • Size

    408KB

  • MD5

    4d67fab0f0ff041b0c90aafff035288d

  • SHA1

    1a89a9b3e685fae24258367c386eef9582359acb

  • SHA256

    af28bc2c2453388c4bf7cb8eeb3f7c44bfce718015fff693724e28b5858eedcd

  • SHA512

    ddf9369f596685784dcdc5b82c5dfc343bdab2fbb528750657093e67c30f943ad250ca90255bcc1c321ea6f5e614b5e7320b9c3b3d855181531634b23466849d

  • SSDEEP

    12288:rIZGNXkbvLbIZGNXkbvLis89iMGsSaOyi/A:rIZaXkbv/IZaXkbvWs89iMGsSaOyx

Malware Config

Signatures

  • Renames multiple (4098) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\af28bc2c2453388c4bf7cb8eeb3f7c44bfce718015fff693724e28b5858eedcd.exe
    "C:\Users\Admin\AppData\Local\Temp\af28bc2c2453388c4bf7cb8eeb3f7c44bfce718015fff693724e28b5858eedcd.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3442511616-637977696-3186306149-1000\desktop.ini.tmp

    Filesize

    408KB

    MD5

    9918b47f384e12f7a69dbae5318e6355

    SHA1

    a7c970fc6e4fe340d5b2d40d6c1b0625cde02153

    SHA256

    43f3c30557324367d7ccf87d67ce872a655907b6e7c6a9c81172e61ad7b98e7d

    SHA512

    b5b02d321f72ae2e0e8090199bb633b56eefa239283969d1033ecf84ae60095d638e52b06c67878c6f59a2260eb3783f6b633d40fde39fa4ed39c51bd28e3656

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    507KB

    MD5

    56bbfe6ec1a887d9387ea5612bd98532

    SHA1

    1ca031fc2114282b8ebdfa3e459c027525eb5e4c

    SHA256

    0fc905f6e2160aa8af707a130d825dcfd9bc9d0e6dec4f8a7a265ae426bb3970

    SHA512

    7771e80415556208b610bb6dde7544597e018b1052c00539552eaa4531fd0b5534582703f4d9f21b979e914c18b8acf87ed835164e82b4a5838d812d1d909dd3

  • memory/4932-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4932-558-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB