Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    17/05/2024, 14:15

General

  • Target

    12c878514c13da385f62432a0567f504.exe

  • Size

    49KB

  • MD5

    12c878514c13da385f62432a0567f504

  • SHA1

    841f5a79c8cbf7d1a092a0a064d9721b1e3f9bd1

  • SHA256

    45fa81742a04a0adc78077de6ea4bb24b7cc295008fc4c60aec346d73e16a3f3

  • SHA512

    4a4e68c17244e6d5dadb65b43e5c212c08bc5fa626a3b18ddf0eca4b1ba92042e7e804db42681ff661da65d410ae388833afb02a908a9d60fd26f92d265cf3e4

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFxS:CTWn1++PJHJXA/OsIZfzc3/Q8xJJMJJR

Score
9/10

Malware Config

Signatures

  • Renames multiple (3547) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12c878514c13da385f62432a0567f504.exe
    "C:\Users\Admin\AppData\Local\Temp\12c878514c13da385f62432a0567f504.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1728

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2737914667-933161113-3798636211-1000\desktop.ini.tmp

          Filesize

          49KB

          MD5

          dc514ecff3eabd69f5db09ee22826b82

          SHA1

          c6fbf547c3dae1ba6ac8465a8a7bcc4d8dc7813a

          SHA256

          7afb1aaea1f849cda00884e3864fb40f6f2e83044eff43dd0bbd53ce4a0a718e

          SHA512

          f520811730a4e01aaa5f52d67c0e08251126733a6aacc8af2586fb7969d27439cbd921238124df99f5ad01b33bc96ae6c4e160dbf558c78bbe44de657b039e2f

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          58KB

          MD5

          199e339c6f13d94712b6f7c0869f2041

          SHA1

          2f1434c7196777e3c6d3eebc67710a4e3a180b0a

          SHA256

          0c3f52e66c2ca60dd468ebee52887c36a83855cc9e324f7452873f6657a5d7c6

          SHA512

          61f88658f6363f47c51bd8dc483a1866b6168a59d85b8ba0c0374f2f08f00075373589068f00d6faceb83ddd6820b0c172160886055faee119e88d58a13f3130

        • memory/1728-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/1728-74-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB