Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    20-04-2024 03:23

General

  • Target

    d55b3d8df152eae407a3410d4509aff1e064ed3b3b0b1ebc7568997fcee7536e.exe

  • Size

    108KB

  • MD5

    ae15b66b57c4e82445e74b83aa38f2cb

  • SHA1

    0a8cbe0d6bf33f7ca0a15dbb731f4aa0aca82037

  • SHA256

    d55b3d8df152eae407a3410d4509aff1e064ed3b3b0b1ebc7568997fcee7536e

  • SHA512

    5f97156db3fa6cfc93a3aeb1827818a3161cba3020f30293ea5f627b2394f4e36421ef5369c33601b11442a0058a808559825825b48eb5e5c782d81dc0739cdd

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfDPw:hfAIuZAIuYSMjoqtMHfhf0

Score
9/10

Malware Config

Signatures

  • Renames multiple (3434) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d55b3d8df152eae407a3410d4509aff1e064ed3b3b0b1ebc7568997fcee7536e.exe
    "C:\Users\Admin\AppData\Local\Temp\d55b3d8df152eae407a3410d4509aff1e064ed3b3b0b1ebc7568997fcee7536e.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2868

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2721934792-624042501-2768869379-1000\desktop.ini.tmp
    Filesize

    109KB

    MD5

    61bbe854ec1735e4855b9872060dbda8

    SHA1

    c9c5538d4a34db1131f082d3f8f88a520d592cd4

    SHA256

    b24e20225a4c354c9ceac1d989e36577ad6974736bf5a9f25dd876fc21e1af8f

    SHA512

    c6678b6f0c86f1813b659ed603790570d103a20d6de51b45d8ec32419ca136bbaa78deb04f19dcc1a928af088b5e58216d9244b33f3f9998055083109ac4354d

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    117KB

    MD5

    8f7b10761deaa35030807457262ff1ec

    SHA1

    5e5c30867c4c40b4ddc1de8ddaa08fcb0340cd7d

    SHA256

    89ef3eb0c09b30fcb7ea90525cd6c399c532f66433e99f100013edf9fe9d64ad

    SHA512

    d333ac870f9e54ff39bef839ab91e77e17cb2258cd3ed4a6f38096b36a98df404081ed5221e4f361544d3cb025ea85453cc645ea6f75bbcad07357ca4f7c5dff

  • memory/2868-0-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2868-86-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB