Analysis

  • max time kernel
    150s
  • max time network
    112s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-05-2024 19:49

General

  • Target

    277df6b7e2b08e4d801692aa6182ecbb56d2e7d5701d4ee455f554f9b606bd5f.exe

  • Size

    186KB

  • MD5

    b0548f54355655069f0732456444b214

  • SHA1

    709f89fbb2385faeb6a196f104bb2ed1c2ff0dbd

  • SHA256

    277df6b7e2b08e4d801692aa6182ecbb56d2e7d5701d4ee455f554f9b606bd5f

  • SHA512

    378f3e5b199ddf9224ce45d471196c7f305774ebd35b8d2c772decbafee5b0468de70c37e1c2ba92059fec877b03ac71b7890c5319d53b58b24aa18c3dfd2fce

  • SSDEEP

    3072:fnyiQSo1EZGtKgZGtK/PgtU1wAIuZAIuXwFwtdQixiw76y:KiQSo1EZGtKgZGtK/CAIuZAIulr

Score
9/10

Malware Config

Signatures

  • Renames multiple (4727) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 3 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\277df6b7e2b08e4d801692aa6182ecbb56d2e7d5701d4ee455f554f9b606bd5f.exe
    "C:\Users\Admin\AppData\Local\Temp\277df6b7e2b08e4d801692aa6182ecbb56d2e7d5701d4ee455f554f9b606bd5f.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4032

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3726321484-1950364574-433157660-1000\desktop.ini.tmp

    Filesize

    186KB

    MD5

    f8dd44aa10cf213ba7b6aa59a0f2cce4

    SHA1

    bfa0d1523f09ffded23d359ee1d94fdde1dba681

    SHA256

    022b0741735c0160345c4d4849673fcce7df5b1ccef0c8dffb7bda4d9bdbf9fc

    SHA512

    f697867cd2a8749830a41741272086d1eef416408dc0b841832035554450eb431f6e3f97fe046e4f5f1723d2647c9450bf2532980392b81cb618f32907d83204

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    285KB

    MD5

    78840754ab4b8c5eb7601037e4eeadec

    SHA1

    7c97c5dc45e6fe5d1426fae0802b0ee57239bf95

    SHA256

    7122a6a9de596b984290926346a0d60bd8ebd7cc2430cd06ca0a91bc39381c16

    SHA512

    8d85a1d46d178a3028b39dd9c4c2482c59c0775c5ff1767fa1aad2b9919d4266af1a069f81ba45f0040896cac60f6d2abb015caa941a9e77e8d66585fc93d8e9

  • memory/4032-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB