Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15/05/2024, 00:52

General

  • Target

    9a0028dce7f5ca35847f0b313c6cf919948ad5ff7579f377ea77891fb2ec31e7.exe

  • Size

    110KB

  • MD5

    2dbdeca19ac73fccee8ac0dfdfaead75

  • SHA1

    35b64257b23e51cbeded9ad7d4100bc3ffa1ea41

  • SHA256

    9a0028dce7f5ca35847f0b313c6cf919948ad5ff7579f377ea77891fb2ec31e7

  • SHA512

    ddf785c7deaad621de6b7acb203dc27bdac947af95ccb7c3319a262b0251443ee58fe04248da4e38f88ca7c3fa5294686fa70c34ccaa925b026fc4d247b8394c

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hf0xk:hfAIuZAIuYSMjoqtMHfhfF

Score
9/10

Malware Config

Signatures

  • Renames multiple (3438) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9a0028dce7f5ca35847f0b313c6cf919948ad5ff7579f377ea77891fb2ec31e7.exe
    "C:\Users\Admin\AppData\Local\Temp\9a0028dce7f5ca35847f0b313c6cf919948ad5ff7579f377ea77891fb2ec31e7.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1740

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2297530677-1229052932-2803917579-1000\desktop.ini.tmp

    Filesize

    111KB

    MD5

    15b519434fb484baca029e2731af724d

    SHA1

    9e39698c5d9af4f429a9f9182fc12866d7ea998d

    SHA256

    512cc2047484bc97b721b4c1d8dfe4a006ca6a45804afd4af9d1eeb03d31e0ab

    SHA512

    47ff98bf07763e8dc8caf148503374820f4809c670eb0d6fec32b4fac7acfe3c883fd63afd39d52e2376b2fb146c7d18416e4b2ddd04f7e4c6470c134000d711

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    120KB

    MD5

    a64a4c202f8c8c56b33d8a4ff10664b4

    SHA1

    80b749ee549992f2612373fb9e1a6805b6fdbc70

    SHA256

    58b5e18876b1edfc2cce49633004e27f731676fc4a22a2605d12c9d1e2fa765b

    SHA512

    d12fdaedebb03c23e8e67a3f730965dac6a26b3807daa36f3646d534fe76f1fc382fecddc50fd8cb88077226fe114535bbb33d8318b59ef7f85d94c82e823982

  • memory/1740-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1740-74-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB