Analysis

  • max time kernel
    150s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-04-2024 03:23

General

  • Target

    d84d0cc02c20c872e61c6276ebac6d584480262b19d6b2b7de51758009accbc6.exe

  • Size

    147KB

  • MD5

    4dca2682ab1ccdc4ae8f8a74aeecdea4

  • SHA1

    059f6ad8b0fea3ea41085036ace3d00a26cf6160

  • SHA256

    d84d0cc02c20c872e61c6276ebac6d584480262b19d6b2b7de51758009accbc6

  • SHA512

    69b280857c072976452b2e42092cb7a1202f2d04c49212a25bc3a0a40a2a9b950e0403deec6e288a952e3cc262843bf5d5fa11e68bd26ca783a6e72373189274

  • SSDEEP

    3072:+nymCAIuZAIuYSMjoqtMHfhflixihA9HVTXTe:JmCAIuZAIuDMVtM/HkH5XC

Score
9/10

Malware Config

Signatures

  • Renames multiple (4847) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d84d0cc02c20c872e61c6276ebac6d584480262b19d6b2b7de51758009accbc6.exe
    "C:\Users\Admin\AppData\Local\Temp\d84d0cc02c20c872e61c6276ebac6d584480262b19d6b2b7de51758009accbc6.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4636

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2818691465-3043947619-2475182763-1000\desktop.ini.tmp

    Filesize

    147KB

    MD5

    decfb01a0adda14319e1b530f6103ca2

    SHA1

    429515ec79d9ac8f267d0ab567410759c18695b6

    SHA256

    ad02d025519c0c1fd1a6b24c7dfdd526eef34586f3cee8a8ee2a6f58764d7d40

    SHA512

    f02ef0e8b7f0e1e3490a0b92e0da6964d6aecd9ff077d2d11db66e41128538415c5e13ac176410cbca4755187ff6d7a837d9bac6021c6e696ccac3e309faaf3c

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    246KB

    MD5

    55b8a7a296478634ed1f67d02f43f9f5

    SHA1

    c67cb8c6239230e61b1cb2afc0ad7c92114ccff5

    SHA256

    b493e296e7e595435d71767464f892ff72b4b126b99d021cb7dbc955d45ddae7

    SHA512

    6addbe03ba896a5691d607482ef2c45cf23758ec0b4a6cf6879f2b3d9be2f734cc080198c3fb068527861c024652ea4e4787b34fe4ac272be0f72915a5f8aae4

  • memory/4636-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4636-1652-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB