Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    17-05-2024 14:34

General

  • Target

    9453e491633ef0b4a9cdf17ed6865a11.exe

  • Size

    1.3MB

  • MD5

    9453e491633ef0b4a9cdf17ed6865a11

  • SHA1

    a33e0238ecfcffced47a81340c6eafd79753e46e

  • SHA256

    f671db42d468316f84597075d83ef8b95715405aa4c91a97bcb735b7b4371806

  • SHA512

    cb02dd8f4e8b08bea5d80fdf0d8fb9adc5f191d2d2c840da9cd4cf44dbbaa47575b4b95ec19b660958dde9137495f4a1172064bde7d1f808bd00ba68490bc621

  • SSDEEP

    12288:7AIuZAIuOylj05a55PJQHbuZ/kPlWzsiqL1SWb3bqnw6wNHy0N0/AnQ63zg2nzTI:Iw5Qyc+Aqw6KH+AQ6g2zTHqv

Score
9/10

Malware Config

Signatures

  • Renames multiple (584) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9453e491633ef0b4a9cdf17ed6865a11.exe
    "C:\Users\Admin\AppData\Local\Temp\9453e491633ef0b4a9cdf17ed6865a11.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2188

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini.tmp

    Filesize

    1.3MB

    MD5

    4820f6de372727eed3358b5f359f8a06

    SHA1

    a17dfdb03f8f0f3f4b871976e3da9de802d657ad

    SHA256

    ab7bc9e2dc92e537e5ffb94c6a8894585e7f5840d30988d64d56e0c96bf122de

    SHA512

    b20f9eacef682b23f86e1a32d9c7b0911e4872477fae8de85174ca59692eadd2c54400226bcde5a91c47ab028549bf084035e8ef2316e33027c1bb5c61afb3f5

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    1.3MB

    MD5

    60dbfd6a21b92196692cbfd22208c4b8

    SHA1

    a82309f1bdc562526b1dca5f3ee6169d33da73c5

    SHA256

    701a243a19a4ea6dab2a1be1afdf486435fc84805c541eb63b82d9453d7ef116

    SHA512

    1d82b32e423dd62791b6f064d5a05604047ab9a479e8c47fb4e26ed70659f68a35ebbca3e22a11c169db63c0111151c50bece59a36887c2ed15e25ddd69e85bc

  • memory/2188-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2188-162-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB