Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24/04/2024, 15:40

General

  • Target

    484014311526e44dab23938e4e8c809fa4c3feaf3bde27733049957a8cfaa51e.exe

  • Size

    233KB

  • MD5

    19b72d61f7415bf6d180ec07d0e0b96c

  • SHA1

    143b2299307d509175d3dec8f2495fd860464f46

  • SHA256

    484014311526e44dab23938e4e8c809fa4c3feaf3bde27733049957a8cfaa51e

  • SHA512

    ce7306722de7f88a2856bdb9f3fc06ede2e1f1c6a98f02647d283e1cafb02214202fa1d87b863d3a6589ec9ac705072178f0a67de4247a6d212b71d4b29e8fcd

  • SSDEEP

    6144:JmCAIuZAIuDMVtM/q3RFI7HAHSzdmYpEpGP:7AIuZAIuOthFLHSzdBpbP

Score
9/10

Malware Config

Signatures

  • Renames multiple (3057) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\484014311526e44dab23938e4e8c809fa4c3feaf3bde27733049957a8cfaa51e.exe
    "C:\Users\Admin\AppData\Local\Temp\484014311526e44dab23938e4e8c809fa4c3feaf3bde27733049957a8cfaa51e.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2320

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2297530677-1229052932-2803917579-1000\desktop.ini.tmp

    Filesize

    233KB

    MD5

    901e0839786d887004f7d11729af1f23

    SHA1

    fe8ab56b737350f9569a0b408e0f8639aaf271c8

    SHA256

    9862810a0509943a53b9946568ddbb71851ad31ac8584c2819723086cd7fbf28

    SHA512

    a242fd04299b6846d667378e86b7789b5dae45e805d2039f12ea849ef6a5165ac64978e0b450ad2a67eb162771b5eea5a55624d01e76ab8e53e666dbcceb46aa

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    242KB

    MD5

    95e6f42e741d8c09d43d04c4e2bdbcc1

    SHA1

    41c7914017edb41a1dd946d72a902ba6a64960e0

    SHA256

    39919785ccc398391288fbca42053fc0b98c362f18eaf7bcc1bc5b846337731a

    SHA512

    f815f9a80e27f2be0bd4b5f1fc936a039a3d21007ac40076aec3df5006f475a4a267c68e18043145aaa82020469ffbeebbc7a7fcac60e83baa4d3b1152b9b5f2

  • memory/2320-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2320-462-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB