Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29-04-2024 19:38

General

  • Target

    258284dd5c60b8cbe624f86e17846d749a091fe945c8295b9b2d446f1ca0e72b.exe

  • Size

    142KB

  • MD5

    6b36d36b1b38a8e08598fc496e2a6211

  • SHA1

    b4602285be2e116b0ca5633494163482248be1d2

  • SHA256

    258284dd5c60b8cbe624f86e17846d749a091fe945c8295b9b2d446f1ca0e72b

  • SHA512

    187a61f02bca1e0b1b38eebd578a3d42432686eaa17a678c7f50c9f38d4660f52203d6f60ccd037fa08576c624194b25b5119f73df4ef9f6297bb6bd510a8858

  • SSDEEP

    1536:67Zf/FAlsM1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCm:+nymCAIuZAIuYSMjoqtMHfhflixi7hZ

Score
9/10

Malware Config

Signatures

  • Renames multiple (3432) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\258284dd5c60b8cbe624f86e17846d749a091fe945c8295b9b2d446f1ca0e72b.exe
    "C:\Users\Admin\AppData\Local\Temp\258284dd5c60b8cbe624f86e17846d749a091fe945c8295b9b2d446f1ca0e72b.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2208

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3452737119-3959686427-228443150-1000\desktop.ini.tmp

    Filesize

    142KB

    MD5

    0c708f68cf87da53a794ef19c9873246

    SHA1

    8f303a0c76c6362ac3e4b07bb1acb0c5404344dc

    SHA256

    e4c437f9754beb1434d414eb1c7f23dcf42b555513a54d2dd7f020ea8acf74bc

    SHA512

    b7787df8995c7113a49214ba451f0f57489a68f747070cdf37674033b3be24c9cf9a768df120193ed82550954cf796213268d0ea0ee5cb9d73f0b73eb5f1b172

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    151KB

    MD5

    c03ccac2300a652e560c46b3b185c4ab

    SHA1

    5c8d5b67dc76f1d784841546e9d86b9335e5179d

    SHA256

    c861f8cb88be45713b53c4c49f107853061e13da50004de6bcaf454c22716ef4

    SHA512

    3f8cfac091961a671cdd342bccf963275bf4f021fa40261d36ae7509f9eae104fba33d8ba767b0ff8b992275a9101734fe757af041ede06f81126a366116eeb9

  • memory/2208-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2208-652-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB