Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-01-2025 09:02

General

  • Target

    60407a417d259276f569c3128ef3d4e8d6d9b1197f0e230d5e1adf7c7b651d2cN.exe

  • Size

    183KB

  • MD5

    290e036375d560807af6d3db7e967f00

  • SHA1

    62a6000304357d2226b5dc3cba350191afde92e8

  • SHA256

    60407a417d259276f569c3128ef3d4e8d6d9b1197f0e230d5e1adf7c7b651d2c

  • SHA512

    410fb1ce3bffab52361ac84d0a0d130088b02fc82f9c4345fe6b59ccdd89a2a808a251fd12f659b5442239abc3f3008963c843d62ed5147635c8d22f1b69ab0e

  • SSDEEP

    3072:htEyyj2yAeCgjJQWHIjN3tj6qnv0b2UrXkbvLiPz:fEyyj2yAIJbIjNDv0bNXkbvLiPz

Malware Config

Signatures

  • Renames multiple (2722) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\60407a417d259276f569c3128ef3d4e8d6d9b1197f0e230d5e1adf7c7b651d2cN.exe
    "C:\Users\Admin\AppData\Local\Temp\60407a417d259276f569c3128ef3d4e8d6d9b1197f0e230d5e1adf7c7b651d2cN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2492

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3063565911-2056067323-3330884624-1000\desktop.ini.tmp

    Filesize

    183KB

    MD5

    27ca44c75ae48792f3ddd6bc75dc7b1f

    SHA1

    0f26199a4de77c872d1448e6454b76693a9eb481

    SHA256

    8ac6d45ed73d96ebb0e155433564cb98d57679ee766bb974676f7de9550338a4

    SHA512

    47be0e10462d09e28340ad7230c24168393088c37f1b8a34b44bdc1ef02ea2cc906e64a292fccf9ebb812e24ba27f9e0c9b9753a51a1955e540f0f063549bf82

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    192KB

    MD5

    ef0475c7d7122e7c66df2e1d87ca6ce3

    SHA1

    6bcc1b6b53f6458ca9299c8f467335e4aa919e5a

    SHA256

    47b2ebbf3032a8c68d07398360f275441a654f9f7ec92510da491a1632dd5132

    SHA512

    c07b5bd1bc1ad245ac4cbb08fff9ee1588ec6cac7f7db207db7a3d020c019cfef5d98d90ecdfaf3a805e1fe364d701d175b18aa87cd63792a32ff0d00f2c71a4

  • memory/2492-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2492-70-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB