Analysis

  • max time kernel
    150s
  • max time network
    112s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/05/2024, 14:28

General

  • Target

    597f83712b354c8de354dbd0cbaaab1b.exe

  • Size

    129KB

  • MD5

    597f83712b354c8de354dbd0cbaaab1b

  • SHA1

    b9495dad2dd4b0bd426c8ae8585dc7545871be42

  • SHA256

    bd5c8dfd0db5246615b42e34b1c0392a9d49ec96af9b99c871fa8c34537d9a9e

  • SHA512

    26a860f42ab457cb83408fdc75a503f49b7ae86ecb9686ddfc6932375fa71613dc859104beeb9c03445cab02d15499cb95e12d71f0f1dda859a1ee9d87d4c781

  • SSDEEP

    1536:67Zf/FAlsM1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCt:+nymCAIuZAIuYSMjoqtMHfhfk

Score
9/10

Malware Config

Signatures

  • Renames multiple (4718) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\597f83712b354c8de354dbd0cbaaab1b.exe
    "C:\Users\Admin\AppData\Local\Temp\597f83712b354c8de354dbd0cbaaab1b.exe"
    1⤵
    • Drops file in Program Files directory
    PID:448

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2804150937-2146708401-419095071-1000\desktop.ini.tmp

          Filesize

          130KB

          MD5

          32a5eca3cfbef946f1540a5f4b9e323c

          SHA1

          d0b0bddb17fb1c85f568e94a33d329f3d912e24f

          SHA256

          0db09bb99e76cedc97572b7f4fd97b66ebf67ebcc4ba5023e0fbcb450ab83a5b

          SHA512

          bf9a0bbe1f00127e53922d7a2dc1d1e92aa029501ad7e845b5a0e41fdd78ee1c878cf512d47fb391602a2cc4ebcdbbcc7024b8681fe6d2199eeb9c19b13a579a

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          229KB

          MD5

          bd5b4697fd513963120ca614f1905565

          SHA1

          184eded232480a9383dd7692b14ca8438964e5d3

          SHA256

          64ada5f86d7cf54b41b4d26cda7d991b5b50e0f779e43dca22defcfc24e76967

          SHA512

          685dedda61e174d7ccbfdc06523c9a23701abfb7266ecfc0ca818b5e7df643e0438f6a23b924a8a329be04dedc63c40adf0a34ee052d17e8ab7b0ddb16cab79c

        • memory/448-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/448-1600-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB