Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    14/05/2024, 22:15

General

  • Target

    613e70743f04829e16ace699feb7466ff240fe00f155a131385a296b2b6f0dd3.exe

  • Size

    108KB

  • MD5

    1cd19658c4c3d011a207c0cabbeec003

  • SHA1

    2fc4a3991357c755b3c3b122f13a26259513ef99

  • SHA256

    613e70743f04829e16ace699feb7466ff240fe00f155a131385a296b2b6f0dd3

  • SHA512

    e8450961f77d3803a411694fc326356c6eb7b4acfd91bbf1821a01880f546f01ecca5a20940a52b78e4ef1aad8230c1b285145edec8bb4d735675910fd79f663

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hf0xA:hfAIuZAIuYSMjoqtMHfhfx

Score
9/10

Malware Config

Signatures

  • Renames multiple (3453) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\613e70743f04829e16ace699feb7466ff240fe00f155a131385a296b2b6f0dd3.exe
    "C:\Users\Admin\AppData\Local\Temp\613e70743f04829e16ace699feb7466ff240fe00f155a131385a296b2b6f0dd3.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1700

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-268080393-3149932598-1824759070-1000\desktop.ini.tmp

    Filesize

    108KB

    MD5

    0cee90b9a0a68f8ce8da82aeb8aa38d3

    SHA1

    7971f28afc239dd7f681380e969db3a2ead6de7f

    SHA256

    772ece590ab60cb60fb99fc9484dad80a75ea39dbe490ad22a0a12867a1c6b22

    SHA512

    18f23acdeb12da9a27db41ddbcacfaa3d3f9e17ca00620fb1bb5627b51ac1681e5b91bc53cc8c94f731019249efc5f13673f182d7da1b3535303affc35e063bd

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    117KB

    MD5

    c5b7dddb5fed8c12659c6873db39cb69

    SHA1

    8c8f949d293dc1c56fdcdcd2bce5f45495de1281

    SHA256

    4d2b9bd880a28542de0dde94ffbaa4782efbf71550c711e569d57f5da0e8e7fa

    SHA512

    d0fe633ddcd27c5287712e702e375d36f591589bbd745f32ecba3552b71039a586bda39e96fe0c99d19388543a7186750232bdeff14e52bce03fe7420c7d2cc2

  • memory/1700-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1700-76-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB