Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 01:09

General

  • Target

    74cb0d4e1d03a4b67f75e0a3bfa1170b18d425d5e30570d348dcbd38f1ca8551.exe

  • Size

    163KB

  • MD5

    17bf9acc149e57816b1f9e2ea01db975

  • SHA1

    3c8fbbe114e82e7f4899f416ba489fd6aef4e5df

  • SHA256

    74cb0d4e1d03a4b67f75e0a3bfa1170b18d425d5e30570d348dcbd38f1ca8551

  • SHA512

    cd8e225364144219b1eeab8c0d9bf479fdec8e046fd4a36493b592ba34ba6a4f9a4b5664cfcc85a3e9018e2e222ad63e6dd8eede5bd954e58cad1899a0ebfe82

  • SSDEEP

    3072:+nyiQSo+xFiQSnJOIYTXof60qoYKQJdRXOiaXt5iVgmz:JiQSo2Vtof6zRjdpOL95y

Score
9/10

Malware Config

Signatures

  • Renames multiple (3454) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\74cb0d4e1d03a4b67f75e0a3bfa1170b18d425d5e30570d348dcbd38f1ca8551.exe
    "C:\Users\Admin\AppData\Local\Temp\74cb0d4e1d03a4b67f75e0a3bfa1170b18d425d5e30570d348dcbd38f1ca8551.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2084

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2737914667-933161113-3798636211-1000\desktop.ini.tmp
    Filesize

    164KB

    MD5

    7628e0a54786244760df108e72114398

    SHA1

    b15f6374869321d6028e6f9f75c421ce48958231

    SHA256

    908a28f851fe46b3b6609e02080d079ca9ef656194a62d415c5efc5b499687f1

    SHA512

    1ec1ea36638ade17aa511e6e1a9517f5e5b48f41ca6aada42234b0a19b3046ef42ae74e99959a0846afea55d246f9aead31c62dfb5d79413fa2c77428ec413c0

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    173KB

    MD5

    6dbb172863a1b5bd15c194b86d485cbf

    SHA1

    5e8b4cfbaa975bc450eac34581a7e7491c4778d4

    SHA256

    596b8d6103f8a1053f6312a5d90703e95e09ba0ebe8cc49f8c023b73360bc070

    SHA512

    61f024cc3514aafcc017c98078a81164576ef96b03ac5a66f68a0c92113afabbe17da40ff2686cd4794e1ee46655c1cd5266ef6670c5ddd2fd1a719f88961277

  • memory/2084-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2084-582-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB