Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    15-05-2024 04:21

General

  • Target

    e6a7e9290b735317afb828d4e135a72d42599e42061f5eb8b0b13f01f61e3d0e.exe

  • Size

    130KB

  • MD5

    3abc53030b2ed1b6ee20ace17757717c

  • SHA1

    a97fedd913c20b1329de4f6206b7b509fddedcbe

  • SHA256

    e6a7e9290b735317afb828d4e135a72d42599e42061f5eb8b0b13f01f61e3d0e

  • SHA512

    27194987148c2544bd6680688e620b019eae08b50c18964dcaae7f6d189fa9d154e4435c8cbdfd690d049c997c80f6e05e70703c20d205668d93fa046862429a

  • SSDEEP

    1536:67Zf/FAlsM1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCv:+nymCAIuZAIuYSMjoqtMHfhfG

Score
9/10

Malware Config

Signatures

  • Renames multiple (3442) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e6a7e9290b735317afb828d4e135a72d42599e42061f5eb8b0b13f01f61e3d0e.exe
    "C:\Users\Admin\AppData\Local\Temp\e6a7e9290b735317afb828d4e135a72d42599e42061f5eb8b0b13f01f61e3d0e.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2220

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini.tmp

    Filesize

    130KB

    MD5

    1f91b49a3a11f0006441f19d38ec5a49

    SHA1

    fba5fe741ea5d91731fc700210bd541d57208954

    SHA256

    e589eedcd77b0a890ef4b1ab62da2af262f75abac8cccae95ad1d0ad05a2222a

    SHA512

    808c1c0f6f18b16dd6445f077dafd448ea8ef2944c547b338e4ad4b8f3cd00a65879d017904e2561e1f5a9243983296675e111b5d52c1dfde06e8db4d5c380e8

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    139KB

    MD5

    3246b58bc6754b3bf587b88972b1be25

    SHA1

    a370cd5e803d177968ba749455a0b1c3434f67d0

    SHA256

    b9847b19a47d3788668f52b7c59ee97ac45ed11c5dc8c00270e9a3a05d9c47c7

    SHA512

    631db19dbcb75dab6ef090fb50c65b8bd3cdf37c09b59f1dd586abfbf3f35e84c1aba9d033eaaf200fb607cf8e552bcc038d9d304e4212dc6009357e2eda612f

  • memory/2220-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2220-466-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB