Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01-05-2024 01:04

General

  • Target

    98323524e9be576534c447dd71717f89d8fa9fe7b67989096cfba3661a3a272f.exe

  • Size

    340KB

  • MD5

    9efe844a512b04337819ba90a5e76bec

  • SHA1

    9b10c99c293a4775eae20065b211d8bb53cec427

  • SHA256

    98323524e9be576534c447dd71717f89d8fa9fe7b67989096cfba3661a3a272f

  • SHA512

    e9370e916af63707aaf8fe404dadd2952b63b849f20e545ceb682fdb2aefa3616ebd4dfeab6bb47352e218afcd08c9e6647c5887306cac205ac9cf05325c731f

  • SSDEEP

    6144:JiQSo1EZGtKgZGtK/CAIuZAIuxQSo1EZGtKgZGtK/CAIuZAIui:AQtyZGtKgZGtK/CAIuZAIuxQtyZGtKgX

Score
9/10

Malware Config

Signatures

  • Renames multiple (306) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\98323524e9be576534c447dd71717f89d8fa9fe7b67989096cfba3661a3a272f.exe
    "C:\Users\Admin\AppData\Local\Temp\98323524e9be576534c447dd71717f89d8fa9fe7b67989096cfba3661a3a272f.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2776

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-330940541-141609230-1670313778-1000\desktop.ini.tmp

    Filesize

    340KB

    MD5

    1b0855333e0a71bbacd7a9161a3c8175

    SHA1

    74d1bb8dcd023793f9154ccae95a7254a52e62e7

    SHA256

    9354ee57df7298d6db8b6b8bbe926a9dfec715f8508113b705623fdd2e0a6d59

    SHA512

    a23b216c64cf33558b19e5533dad384129d33b925e0162f1f91b4d0eddeb74d42b4588c46a680b976c13aff55d18ca97bce17f65324c25ba7c7d4f8b2f264c56

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    349KB

    MD5

    ea5f4f02f9ba411a32ffaf9a3d66d76f

    SHA1

    bb0064b599eaa4afda7c6505e162f27536272b07

    SHA256

    27d630e439fddd219c5ab90ec83ce2702e63656a5051f9b05de15c30f0f92cd1

    SHA512

    3890020b66a11593b02e012ca84edb71b469900ba947d3c8fb75a32046976ff7abfa0e71ec0ac909ed128292a43ae0780af4ad0abf36d327d75dd35f9809b08f

  • memory/2776-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2776-68-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB