Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    13/05/2024, 20:12

General

  • Target

    35dca7406b5873d0ac1a7627205497166900d06c685114383f673361120afc6a.exe

  • Size

    103KB

  • MD5

    a193e27edfcc99411bad658bc62165ad

  • SHA1

    96bfa145aa801aefd075399c7293129a542b94dd

  • SHA256

    35dca7406b5873d0ac1a7627205497166900d06c685114383f673361120afc6a

  • SHA512

    c0f13d71ec646b8125b87bf8a425afdc8611347927cbc66d1bec51b8f01109c853a6f9c006e457742368fe2b5a23d8e12565607e7a5feb45ab78c590a04c7415

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hf0xa:hfAIuZAIuYSMjoqtMHfhfX

Score
9/10

Malware Config

Signatures

  • Renames multiple (3334) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\35dca7406b5873d0ac1a7627205497166900d06c685114383f673361120afc6a.exe
    "C:\Users\Admin\AppData\Local\Temp\35dca7406b5873d0ac1a7627205497166900d06c685114383f673361120afc6a.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1616

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3691908287-3775019229-3534252667-1000\desktop.ini.tmp

    Filesize

    103KB

    MD5

    50e0233ae5721a34e40ebafa6e4565ed

    SHA1

    c29efa9e6b8d141ffdfe01a9693a7a9bb24ad81f

    SHA256

    ba6b3d2791fec95dce0f651e2291e0f0c74eab27d53973b211f97d1c6cf19b3c

    SHA512

    410366e3fbbe5611590849439e6b014ef647d4163b830c0ff57d4da46067c023a9a6343886ba24c14b7a6c17b3a283351073a4fb4965c97a36e406c434ad0f37

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    112KB

    MD5

    52e871364976487ca1cd4574d465572e

    SHA1

    0cbb990a45937f9ee8f01679480139a3fe59611e

    SHA256

    b5ee8c79d02f5360846b21ba5ab732c25897299558015a6b9ef7a15f0e6e7749

    SHA512

    1a88c37e39dacaf3fdef4b0d9a56e86d6d2bd3a6e6f8b5779f9397fe975d2835c5344a81a774e478b0088299e07e95b86ec9938fd4db07ed46936ba44b326641

  • memory/1616-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1616-74-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB