Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-01-2025 09:14

General

  • Target

    82bf79d8b019e27e870f898eaa8385791c8ff43e4b0635f2ca310c45f5b587c7.exe

  • Size

    122KB

  • MD5

    2bf6b7ef007206043f66d623f6bbcc83

  • SHA1

    70c7c3078120c139501a5de3d0178eac6cd154e6

  • SHA256

    82bf79d8b019e27e870f898eaa8385791c8ff43e4b0635f2ca310c45f5b587c7

  • SHA512

    53195c2bf838bc7b0af02f3087ca502692b988f20dd26e83de2f436e778c538d834cd9ca364ec1f65180ba7458c784bc1c77d0701809f2d9e244fe41630fe345

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTBmRPsdj2hkAeCgI3i0CJS1Il+lM5QOVhFVh6Jb1Jb3rqsuz:fny1tEyyj2yAeCgjJRDFDqrDIuql

Malware Config

Signatures

  • Renames multiple (2835) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\82bf79d8b019e27e870f898eaa8385791c8ff43e4b0635f2ca310c45f5b587c7.exe
    "C:\Users\Admin\AppData\Local\Temp\82bf79d8b019e27e870f898eaa8385791c8ff43e4b0635f2ca310c45f5b587c7.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2380

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-312935884-697965778-3955649944-1000\desktop.ini.tmp

    Filesize

    122KB

    MD5

    4e91a4c27000fbeb30e426987ed58cf4

    SHA1

    5eb079cf9f93ac22e480fd53b588cf7cbc6d3eed

    SHA256

    d6de792b98675c0acc3485221040397ccf8e25919ddb9e05efe418773fbe4166

    SHA512

    dfb0a05c3dba5d27d6d7310596e19f6ec762979167b11fd1a6084e2f51c4491ea99e46f25b335420563aed6d2c3a579e7da365dd6ae8e927dd49e50173f43689

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    131KB

    MD5

    f60a8b5e2827fc0a5709d2cbfe9996ef

    SHA1

    4df36ad389cf3d091ecdca8d29083ab18100b2b2

    SHA256

    136fdd2be87a120cb0670f588ede9062ed8fd8f8757231b463bf3a24a46b3187

    SHA512

    9c2facac23421d557fe9035d53017bfaa7b8a9e55de8cd25002551b418e4ca3b4163c8b05454faee986d1ef693319feb672d13be99d3f74d98e42f7433c58cee

  • memory/2380-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2380-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB