Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    10/05/2024, 23:43

General

  • Target

    8a4711d3285111fca73d0dc86d3feed1e8253c1f377d584385b1e123decc512b.exe

  • Size

    41KB

  • MD5

    23df42d12e1041764b9ecdbd2d14e3ef

  • SHA1

    5c4db08119b62d9b361c2952d8bd6880c81e5450

  • SHA256

    8a4711d3285111fca73d0dc86d3feed1e8253c1f377d584385b1e123decc512b

  • SHA512

    926171942ee13792d9f7977ac539f57f9f15bb776076e5a8f62bdf129e29312770f92559210e7a6b9b527b4f1e8038114b2f4c7c82b75deaf210ed47c8e67715

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAvL5:CTWn1++PJHJXA/OsIZfzc3/QuL5

Score
9/10

Malware Config

Signatures

  • Renames multiple (3516) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8a4711d3285111fca73d0dc86d3feed1e8253c1f377d584385b1e123decc512b.exe
    "C:\Users\Admin\AppData\Local\Temp\8a4711d3285111fca73d0dc86d3feed1e8253c1f377d584385b1e123decc512b.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1700

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-481678230-3773327859-3495911762-1000\desktop.ini.tmp

    Filesize

    41KB

    MD5

    bee827d918370ae9ec0cbbb7447dcd82

    SHA1

    c1250a624b0247e6c45f9c92e29bd6cf4ae59ade

    SHA256

    0c94b523be2e099b2b58b9367a0e4be28cf5fe2bff0d44a984f7fe66fc179019

    SHA512

    268e3165d8938563e8777edc928007c96f4aa22344db6c1dd0a67a8ced193ee292b4ff5c93852468950cdb8d8c9663208cf9d79b6d4c93bf380b13a6980b02b5

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    50KB

    MD5

    33cd856d6f2f732d15add05b616dbbf2

    SHA1

    d2400b3815516333ade4b24ddf4ee74be54c355d

    SHA256

    75571583541692f3c051b4c8ed2631c6cc2474ef2636fb8c5fb13a808ee3189c

    SHA512

    f59c8f8a1ab09f8a705f772f5164b95c47b8b67ea1d0460eb07ba7c66da133c4ef33593bee131e32db390d736890f26f8e40498bfdb1f6004052760980962ef0

  • memory/1700-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1700-76-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB