Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    14/05/2024, 03:50

General

  • Target

    eb828ba0e243b4f993b6afd09566186d3c4906ae7bccf91f91552a9bd3a081b6.exe

  • Size

    97KB

  • MD5

    5b45615cb3c69f90da922be19952bfff

  • SHA1

    1766cfca9445e41089eecc1910b9828af667ea8d

  • SHA256

    eb828ba0e243b4f993b6afd09566186d3c4906ae7bccf91f91552a9bd3a081b6

  • SHA512

    23db5dc901204f6dc096a0b5ea2968789efdc3cddea45b19a8c0f767472d98f87f9829aab424f0e81da79af5abf197f82e809dd0c553cd7003f58281daeb74f7

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfw:hfAIuZAIuYSMjoqtMHfhfw

Score
9/10

Malware Config

Signatures

  • Renames multiple (3452) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb828ba0e243b4f993b6afd09566186d3c4906ae7bccf91f91552a9bd3a081b6.exe
    "C:\Users\Admin\AppData\Local\Temp\eb828ba0e243b4f993b6afd09566186d3c4906ae7bccf91f91552a9bd3a081b6.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2128

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3691908287-3775019229-3534252667-1000\desktop.ini.tmp

    Filesize

    98KB

    MD5

    589249bd98a48084a8c14a6a717e1ef9

    SHA1

    5f1d39dc5159e97afc0d3abf845d239c8ce55427

    SHA256

    4d749dc5c125ada3afc0ac971e2a23f7fb753f6bf9926c112866cc8f63a35bf8

    SHA512

    83869033b4981ad5f9b3eb916a7dd7d4fa4bcdcec3f7778c7184791b5b2b6778a959cef0c468afc7f077dd0bde76f8d156908faa225e6eb5de9f099e397d8d54

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    107KB

    MD5

    4c63caa5abb728d4f520dd37ea229dc6

    SHA1

    30440a565498aa346f2e0391279a5242e2b2358f

    SHA256

    2c4eab3916754baf56cd4f9091d833446b42f137f24ecec8593a4dd4219f2d50

    SHA512

    239950f5860fc6a456f247513c0939df10e0f2497ace24f6c4b85586b5a25286a7d0562b48134151a91bb0acc9610033230b0a0893d94cbf3dd872c74759dab7

  • memory/2128-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2128-80-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB