Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 21:27

General

  • Target

    4bd6c6c252d2358f46f1a54af4b56cf943ba0690546c2c68a7a35b68de514555.exe

  • Size

    64KB

  • MD5

    90a2a7b57235e700ba43c66a385abd6b

  • SHA1

    b67759e4dec5af1f42aa3a548948a759f71b3833

  • SHA256

    4bd6c6c252d2358f46f1a54af4b56cf943ba0690546c2c68a7a35b68de514555

  • SHA512

    418a022a8819e0c9ceaa1bd339c325175953c6e05dbb48ef02bd45f89393e9c08362cd3c5d48ffc75af75034007baadd1a33aba057c632639e6ffb6148aa334f

  • SSDEEP

    768:67Blpf/FAK65euBT37CPKK0SjHm0CAbLg++PJHJzIWD+dVdCYgck5sIZFufGWQML:67Zf/FAxTWY1++PJHJXA/OsIZI

Score
9/10

Malware Config

Signatures

  • Renames multiple (3607) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4bd6c6c252d2358f46f1a54af4b56cf943ba0690546c2c68a7a35b68de514555.exe
    "C:\Users\Admin\AppData\Local\Temp\4bd6c6c252d2358f46f1a54af4b56cf943ba0690546c2c68a7a35b68de514555.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2916

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2248906074-2862704502-246302768-1000\desktop.ini.tmp
    Filesize

    64KB

    MD5

    bba557dc694c66846c8f3f6a752845bb

    SHA1

    1286b1700929c0f2a16a41df3dbd1409785e5e97

    SHA256

    32d5be3300bc675c754670fe9340f6d9b52a249a27fa071d9825201d5b13ab10

    SHA512

    68865124390adaba585b76c44da85c7fd5a86619dbfec484b578b9f37611a43d0a71a4c3d10fd06761707171ac8b5e34c1e80863144b7faec6da24658a90f20e

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    73KB

    MD5

    671f0f67b927a9d35b1c3517089a5403

    SHA1

    4e96b166a9ead6d5689d00d5acea7ae099096342

    SHA256

    d056e53e45f709436839c464041c941a4ade87395d4ac368910a62302f613efe

    SHA512

    f50a144d4a7e8027387fd3926590d68a136c95e6b9e0d810f773fb7e4cd374c38bb75228a616d298389e465c9dbdd4b0ec789dbe1515b0c53aa4e863e1a8f5ce

  • memory/2916-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2916-652-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB