Analysis

  • max time kernel
    120s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-01-2025 09:14

General

  • Target

    82bf79d8b019e27e870f898eaa8385791c8ff43e4b0635f2ca310c45f5b587c7.exe

  • Size

    122KB

  • MD5

    2bf6b7ef007206043f66d623f6bbcc83

  • SHA1

    70c7c3078120c139501a5de3d0178eac6cd154e6

  • SHA256

    82bf79d8b019e27e870f898eaa8385791c8ff43e4b0635f2ca310c45f5b587c7

  • SHA512

    53195c2bf838bc7b0af02f3087ca502692b988f20dd26e83de2f436e778c538d834cd9ca364ec1f65180ba7458c784bc1c77d0701809f2d9e244fe41630fe345

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTBmRPsdj2hkAeCgI3i0CJS1Il+lM5QOVhFVh6Jb1Jb3rqsuz:fny1tEyyj2yAeCgjJRDFDqrDIuql

Malware Config

Signatures

  • Renames multiple (4193) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\82bf79d8b019e27e870f898eaa8385791c8ff43e4b0635f2ca310c45f5b587c7.exe
    "C:\Users\Admin\AppData\Local\Temp\82bf79d8b019e27e870f898eaa8385791c8ff43e4b0635f2ca310c45f5b587c7.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3412

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-493223053-2004649691-1575712786-1000\desktop.ini.tmp

    Filesize

    122KB

    MD5

    b4f986221f3bddacf38c8b0011d6f9e8

    SHA1

    80f0f4ed2506cefc226d5ebeb32a53175769ab54

    SHA256

    16e8cd1b9015e392de23b59eb17a5ee22f6055b2171126dd519ba18beee393bb

    SHA512

    22a5260020667bdee197045d90d301df04f8c334555f1869c2019f9c93ad56c330711c5eeec1c67eddbff911e097899c93167af3cef366c521688749b7a15d76

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    221KB

    MD5

    066ec952b5a27ae8de1dcdd12557b059

    SHA1

    98de1b8abaa1354e350b6794dc371e043bf23785

    SHA256

    5d2072cdc5a6ec1ceaac4b0c947e21bca915b69730af25ba7c55467d13bd389b

    SHA512

    44e1cbd759ebc9b154a4720c98a95f46b015948b4553b4b71a50f3523e1fda00c943f6b76d97fcb75ef5d67a262d9aa0d6c855832ba131e3591c50d92a30a377

  • memory/3412-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3412-662-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB