Analysis

  • max time kernel
    149s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    02/05/2024, 18:17

General

  • Target

    04a67293be35128d82ba66aadd5964013b60cdd0b0bd881abe3a423e1d645695.exe

  • Size

    101KB

  • MD5

    9ea089f15b331168463930d8b5e1c7d2

  • SHA1

    7b08a13cecd788e196b6902c4f77efe82e04ecde

  • SHA256

    04a67293be35128d82ba66aadd5964013b60cdd0b0bd881abe3a423e1d645695

  • SHA512

    84838d7ec5c3e2fc173f3c41fe63cb0d8ccf6f6477df39ce1ad24afe3f344bce9fa5ff331d6d115effc955fef56c764c1d73779f862ce24e6c3f438d15f77583

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfH:hfAIuZAIuYSMjoqtMHfhfH

Score
9/10

Malware Config

Signatures

  • Renames multiple (3445) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04a67293be35128d82ba66aadd5964013b60cdd0b0bd881abe3a423e1d645695.exe
    "C:\Users\Admin\AppData\Local\Temp\04a67293be35128d82ba66aadd5964013b60cdd0b0bd881abe3a423e1d645695.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2856

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1298544033-3225604241-2703760938-1000\desktop.ini.tmp

    Filesize

    102KB

    MD5

    325e7e6076041fe9dfb4abf4f2a48fda

    SHA1

    9bed2a545358aa2ef9da38c37777b32e9c73c134

    SHA256

    961611aa1608d0648a306b5f8f537b89312af07c0c89733f5b40cb16429b93c5

    SHA512

    398d16b487ab56212012263956770599948957f084a3b160e0dc322bc7936766d186a4f66a6903d5aaec91d4a724e13037721c0a31ab88194001500b5cdf10af

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    111KB

    MD5

    84777fe405783c0ccf3c88a7790a1c13

    SHA1

    22afce33cc645b92914128f7d8734fb9883378fd

    SHA256

    8ce4431903f30aeb96f01d9c3e9bf28d87c0929732297d5d23e352c19ee2de4f

    SHA512

    b416e48899522f3cdb48a809821e8c4500cee504a4e8bc0202b949c512690df20dc5bc2a415cb676cda17aaebc92b1f696e7c325e5d9dbae5be5b254499717b7

  • memory/2856-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2856-86-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB