Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29/04/2024, 04:19

General

  • Target

    fce90bfdce44e491bb0113df14dc9caa3f6aefe92e3d4c4d917109e1096f76ef.exe

  • Size

    184KB

  • MD5

    0f069ffb49415d4501a82384473703e6

  • SHA1

    7c4a1e6984ec6cd87ae53e0c44bb1ae182213e8d

  • SHA256

    fce90bfdce44e491bb0113df14dc9caa3f6aefe92e3d4c4d917109e1096f76ef

  • SHA512

    25cf09c1a67c00f262e9c56d3d09687f3b34d808de289afc8e25756e158ddca9e1c7cc1c33ba518510e1263c8f40ada75a5fd31c41fe88fad81f50eb894f41b8

  • SSDEEP

    3072:+nyiQSo1EZGtKgZGtK/PgtU1wAIuZAIui:JiQSo1EZGtKgZGtK/CAIuZAIui

Score
9/10

Malware Config

Signatures

  • Renames multiple (3224) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fce90bfdce44e491bb0113df14dc9caa3f6aefe92e3d4c4d917109e1096f76ef.exe
    "C:\Users\Admin\AppData\Local\Temp\fce90bfdce44e491bb0113df14dc9caa3f6aefe92e3d4c4d917109e1096f76ef.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2000

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1298544033-3225604241-2703760938-1000\desktop.ini.tmp

    Filesize

    184KB

    MD5

    86890e30a40b67beb9ada0c98b357725

    SHA1

    4a2fe9ffc1e8bd84f06801fc0b5ff18001eec145

    SHA256

    2eae215a0da8e9a7ed072d7384c831bb9f19d8b06836951537c16827058c1efb

    SHA512

    e62566c86dcf786bd7906fb80fa799328bd7b36fb4803e6744c99ca465e10401952c8224ef7c0dabf2eaa1c4fff581ffbd91898a16584a0b64d7c204de5846f8

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    193KB

    MD5

    9cc4ec207530c042d9c35f6523b8fc8f

    SHA1

    cb075a366089ed657c657f6d52dada6600d857c6

    SHA256

    c69e2b1a9043af295dac04924961fdcaec618c355776fceb1e979a38c26bd6b9

    SHA512

    18bb9a6619a23d26d4d9b83033715fbb04f8e1a3d8879dd6b8d70edc3151c3095ff8c1e12ecc47dfb64e3eec0de78427ec309ca8ef26349b11ef096d7abb3691

  • memory/2000-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2000-512-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB