Analysis

  • max time kernel
    150s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11-05-2024 19:09

General

  • Target

    192c0ae6bce5cc382ed5bf22a92852c3dbb24e9a502c26bbafc9022ff06cb1c6.exe

  • Size

    53KB

  • MD5

    658d3d0691c138533051d139ba21747d

  • SHA1

    6b6bf31f2203ca3723d51f37355da46163ec816c

  • SHA256

    192c0ae6bce5cc382ed5bf22a92852c3dbb24e9a502c26bbafc9022ff06cb1c6

  • SHA512

    b08b22ffbaf8842c6061c2607f6498e3a1a698060dc26b9fe591cb4bf08430fd70bb9abfd9fa03451ec7f0fbecfffdc844b34c5b78fc0071168f8c31e44547e4

  • SSDEEP

    768:67Blpf/FAK65euBT37CPKK0SjHm0CAbLg++PJHJzIWD+dVdCYgck5sIZFZj:67Zf/FAxTWY1++PJHJXA/OsIZL

Score
9/10

Malware Config

Signatures

  • Renames multiple (775) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\192c0ae6bce5cc382ed5bf22a92852c3dbb24e9a502c26bbafc9022ff06cb1c6.exe
    "C:\Users\Admin\AppData\Local\Temp\192c0ae6bce5cc382ed5bf22a92852c3dbb24e9a502c26bbafc9022ff06cb1c6.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1808

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-330940541-141609230-1670313778-1000\desktop.ini.tmp

    Filesize

    53KB

    MD5

    5312fb3b0795ea8b4493e9ca97d0ac3d

    SHA1

    d7b62747a58295b747e31f91d500719553b516cf

    SHA256

    e634bcc9a2ac4f79841401aaedd12a8c2af6205e781a91a9d4d18e69bd36e282

    SHA512

    b2f21d9dcdc1b42fe08c517e0c3ff09843b3e6a859c1cd2b72227d0ab17f893e40c09d2882dbe83cae4ea27e0e6041d6327fb6b3a62ceb9cc9de8adc33f654bd

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    62KB

    MD5

    afd3beaf23f30e791a3b2e3ed6e53c75

    SHA1

    968b13684c557f29854541df8feaddde40669f2c

    SHA256

    dabdba1a0172d74568cab19b5c91fd30f75560a33d4045faebdf0083e415838c

    SHA512

    c4ac1b861f1ec3739b3704bd196b3ab07d2876871511a1da5fb90a577972a04200d6ff7e1dec3fd66694e4bf603882e3960f5149946feb40840e9c81998d42c7

  • memory/1808-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1808-68-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB