Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    03/05/2024, 02:11

General

  • Target

    acebe5e76dc7e9fc9881cb063a146c2642ee3ab843b03d611f68f0b9f2691667.exe

  • Size

    38KB

  • MD5

    6a9c114b500c2118cf8e178e660a62bb

  • SHA1

    050e44c17e96212e92f6c4a57a8c6b63df3a5f61

  • SHA256

    acebe5e76dc7e9fc9881cb063a146c2642ee3ab843b03d611f68f0b9f2691667

  • SHA512

    502468dd770f9c70e79af8ab86bf8c70906becddd5351830161bb545da90e765b28fb871101e2a495db1788bc09f5c83ec12ba5050b25ff8576db1f7c2fa29c3

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAB:CTWn1++PJHJXA/OsIZfzc3/Q4

Score
9/10

Malware Config

Signatures

  • Renames multiple (4107) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\acebe5e76dc7e9fc9881cb063a146c2642ee3ab843b03d611f68f0b9f2691667.exe
    "C:\Users\Admin\AppData\Local\Temp\acebe5e76dc7e9fc9881cb063a146c2642ee3ab843b03d611f68f0b9f2691667.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2040

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini.tmp

    Filesize

    39KB

    MD5

    8b3f270d709330532abaf5e38a24f98c

    SHA1

    f3b1c7de4e4db95ba3cb0acb65ae3d4592f9b979

    SHA256

    01170162a0542eeee19ca044848402edbb654ab31e6d8ab51e081f747682fd4e

    SHA512

    d2517c49db13164db9bc9ccb66e599a0970fe1f5a44d1c296779264d48ec4beb229122ed84a6f58e12ab03ababb050e16bf2c424a89830167643c9b092a3a4ea

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    47KB

    MD5

    d7eea14704cce806415300356ab3ae0f

    SHA1

    7e25bd1f678ffa3bfb60a1f51a29d9eca27b135d

    SHA256

    95d8de6e9d27a3af545d6eab1bb8e8452f8305c2095f7a4ed0ae32d762856403

    SHA512

    c1234da7e2e1c0d6e34f579505d88958c783525fe05d3ade94a54f6fc18722fee6bb54968d5ac0485bc914ebf04f41094f4b1ae076c4597727bbb1e67d60c3c0

  • memory/2040-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2040-86-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB