Analysis

  • max time kernel
    119s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-01-2025 09:02

General

  • Target

    08574841cfeb8306a1b2ff5b275d326efb26f502cc47a7d95c18027b2904ee82.exe

  • Size

    208KB

  • MD5

    51344a96e7badaa6d5380f6656298cb0

  • SHA1

    26c413199d55cbc3f730918c9786543deed6cf4d

  • SHA256

    08574841cfeb8306a1b2ff5b275d326efb26f502cc47a7d95c18027b2904ee82

  • SHA512

    2dc8a130adf3931d7e0b54e8833255a73c305654147dd2bcc597be0f02bf44ced2caa926584153c6d12fa0b3125c454495444159369a9cf0320b3f8348424969

  • SSDEEP

    3072:fny1Mwsny1MwnWHIjN3tj6qnv0b2UrXkbvLh:KRiIjNDv0bNXkbvLh

Malware Config

Signatures

  • Renames multiple (2664) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\08574841cfeb8306a1b2ff5b275d326efb26f502cc47a7d95c18027b2904ee82.exe
    "C:\Users\Admin\AppData\Local\Temp\08574841cfeb8306a1b2ff5b275d326efb26f502cc47a7d95c18027b2904ee82.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2552

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-312935884-697965778-3955649944-1000\desktop.ini.tmp

    Filesize

    209KB

    MD5

    6756f423b9da55f854be267eed461adb

    SHA1

    4450f508ffb413c3df7b94b58dd2c5169f6bea2d

    SHA256

    e9999b17910d1d53b0a3747f25617530eb6f5c5d5cd33f310a44df7635b57cca

    SHA512

    39d11ba04291f7baf610beb1006bb66ad8eb1fc5ffd33522529baecd2911ffc0cb3b0fee11d403f1c1af0c35bcc36995f411036fe1326c4d2b72aecad7beec26

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    218KB

    MD5

    3c5a4e5b3c7c4dd1d9070f8bd89fa819

    SHA1

    382f60930538cd5303057ad6b42a31f42eadc1e8

    SHA256

    66c1d1abfef2b6eec0fecead0ecca51312a2c80ceb47e8ed67282daa8e59eedc

    SHA512

    8df5f0591417222f0509ccebc6df1cdadda5cbaec4ec531d6b6cb80c1a37c5eea6df5eb41e780daa014cd9e461670e9ee68ba28faca6dd7582e56271682b8f59

  • memory/2552-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2552-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB