Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13-05-2024 23:16

General

  • Target

    824aac2ec860e1095e139c7b7791dd76a98084c192b4d2ad27923de59aab8a6b.exe

  • Size

    131KB

  • MD5

    6398a277a5fc76a1c69cad3c24763d09

  • SHA1

    e0c4c8d61b6a364b03471bfe8a157b7cb027e00c

  • SHA256

    824aac2ec860e1095e139c7b7791dd76a98084c192b4d2ad27923de59aab8a6b

  • SHA512

    a19a558501b99b50b2784e645917ee6293ec3656a36174190dc1bb142e22c8e9bc3d46ea15a0914da5e260abbd0f0b234c810e3fa0afe8858bc762bbe942b496

  • SSDEEP

    1536:67Zf/FAlsM1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSC4:+nymCAIuZAIuYSMjoqtMHfhfQJ4Jf

Score
9/10

Malware Config

Signatures

  • Renames multiple (2852) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\824aac2ec860e1095e139c7b7791dd76a98084c192b4d2ad27923de59aab8a6b.exe
    "C:\Users\Admin\AppData\Local\Temp\824aac2ec860e1095e139c7b7791dd76a98084c192b4d2ad27923de59aab8a6b.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1940

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3452737119-3959686427-228443150-1000\desktop.ini.tmp

    Filesize

    131KB

    MD5

    b86026561b2f638fad350782742d884f

    SHA1

    eecf3c0450d62138ddeae1b8fde24f5395e4c37f

    SHA256

    541ed09767232975c9b80f412e0ab6e22f30d73c8bb75c9df929c1ad9b16d116

    SHA512

    7cdf7311754911aff3005bcaa1e4a667fc6a81778ad58b375ecdf85111ab1ff7a9e657240b54f4c4840791343fbab272ca821982792a24a2e251fb71ec46dbbc

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    140KB

    MD5

    c15c96d760ab4f782e28ec8ba7c32a9e

    SHA1

    6cbd2b028e0d927437f7eb23b27489b06ba94e72

    SHA256

    6a952bfd13ed4962725103bdcedd2afef1a15728367b208e77291ce2a633c4c1

    SHA512

    80d0e08e44a3af1c90bb9f541dec762acc98f58e11f0998f51a46f7d4d8f45337b045a9d14a1865abf26ce36a45d9a40479faa0c521748adaad746f22a572c4d

  • memory/1940-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1940-176-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB