Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    14-05-2024 21:04

General

  • Target

    4423f4950d3a8c8dedf5230233a26694e66b78bec5378dfc45c403730953de38.exe

  • Size

    110KB

  • MD5

    04bee44550aa144a6606ebc1ff8373ee

  • SHA1

    e616ef93926813d28371cd5697625848fc4fd69f

  • SHA256

    4423f4950d3a8c8dedf5230233a26694e66b78bec5378dfc45c403730953de38

  • SHA512

    459650fd7c0c57ca601c73df86648f5ed8829144f04fac089a9eebcbfec7a69312e47673bf64131e1ab5f400a539b9396fe12ac6d9168e639b10c3892c8caa28

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hf0xS:hfAIuZAIuYSMjoqtMHfhfn

Score
9/10

Malware Config

Signatures

  • Renames multiple (3438) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4423f4950d3a8c8dedf5230233a26694e66b78bec5378dfc45c403730953de38.exe
    "C:\Users\Admin\AppData\Local\Temp\4423f4950d3a8c8dedf5230233a26694e66b78bec5378dfc45c403730953de38.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2728

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2721934792-624042501-2768869379-1000\desktop.ini.tmp

    Filesize

    111KB

    MD5

    e781b08522c32de3b2e8a8a0abc4c82c

    SHA1

    12364748c808769a3495fe2fad718eecdbfc6b43

    SHA256

    3755933e4e41301936144f275f7ef2153c69fb139891b3b7fc0b7a3f79e04003

    SHA512

    1b8439e1a190dfe2f4989e168b4e2320592a22b3066ea683f062e218cfec48ca4f8a9aa37b0cb71019b273d30141e5ef6660eed5bbfb993d24989415d351a43d

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    120KB

    MD5

    83ef667d9f0aac78bb7eb7e635d82f8d

    SHA1

    c8e0f5850cb40631d2a828ae92104738163fa283

    SHA256

    3ee4a676945e019c9256fb5ab8ecb6653a7211bd5ca64a2a02f8de19379e1d6f

    SHA512

    ca2c7eb0003757340be2099bba8e00de4426beb8c06f20a382c721a70a2e25906b136d9a2ad289d83f82ccdf923400571e12fd597fc49c02e6595fb50ef8916f

  • memory/2728-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2728-74-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB