Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/04/2024, 05:07

General

  • Target

    fa73e0e41a45a93f202565e0f51c19aaa0275fb4b60753bc56d02a0d7cfffa03.exe

  • Size

    122KB

  • MD5

    169dab63cc8b5b88788ad8e3d513ef5c

  • SHA1

    2933ad4563fde5b49f963480cfafc50c85d7e571

  • SHA256

    fa73e0e41a45a93f202565e0f51c19aaa0275fb4b60753bc56d02a0d7cfffa03

  • SHA512

    68bb0369b524cc4cfc3b7a425589789cf312b4b151ccc66c2eec29e01c3556f40aa23dcd43ebc962dc4dbd07e90ab0090652c7c4d586dd5318b58926f4f09b9c

  • SSDEEP

    1536:67Zf/FAlsM1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCU:+nymCAIuZAIuYSMjoqtMHfhf5SskA

Score
9/10

Malware Config

Signatures

  • Renames multiple (906) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa73e0e41a45a93f202565e0f51c19aaa0275fb4b60753bc56d02a0d7cfffa03.exe
    "C:\Users\Admin\AppData\Local\Temp\fa73e0e41a45a93f202565e0f51c19aaa0275fb4b60753bc56d02a0d7cfffa03.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4752
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1352 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:1088

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\$Recycle.Bin\S-1-5-21-3808065738-1666277613-1125846146-1000\desktop.ini.tmp

            Filesize

            122KB

            MD5

            d604118a8b55d71c8493e998e552b77e

            SHA1

            1e0dc554e0bc729155f724562973730b5ffbf428

            SHA256

            2e0627e8d367f3fc251dc94ea10227627e2bece7de1258c19d92125c7aa90ec5

            SHA512

            aa3a9ad0210271d57dc1eee07aaf7e361be4d6b25837fdd8c96be6c521794ccfe79226b3c1c80070ae8e0ee95b94d67855742186531eaa390196fcf18a60ebeb

          • C:\libsmartscreen.dll.tmp

            Filesize

            122KB

            MD5

            8a7ca78325dd48b06f9b0ff6567d235f

            SHA1

            42918ab2a70f3ae83f7eb30b8518808920abfaab

            SHA256

            5f06df73b1d25d7e08875951fb1bac2188af99a6afdd865aeb495d4cf1908ce6

            SHA512

            22c6881bb21b80c5493e4fea56478669128d72836d204d4dfac3500607dc91782d799b31f80bbdc8f0b2cdeb9a251e333ffc68570b89db7d375146ca5e78d186

          • memory/4752-0-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB

          • memory/4752-414-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB