Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 23:17

General

  • Target

    7395c905a3f9809218e3dcb109f958e03d98fd78cf3e58b76dd985d33df64545.exe

  • Size

    63KB

  • MD5

    4024724b719c7c623b100e21c0abf29b

  • SHA1

    fb96bf14cf15427baf2891b69245b2b73e835660

  • SHA256

    7395c905a3f9809218e3dcb109f958e03d98fd78cf3e58b76dd985d33df64545

  • SHA512

    b5c738c967291511046c3e356f4035964d9892f6170b2ccb973d0451f84b58a9d13ef2b696c6aa8863ac59ed484f1082d3aa99aa5c5364a278aa5c364f5a7fe9

  • SSDEEP

    768:67Blpf/FAK65euBT37CPKK0SjHm0CAbLg++PJHJzIWD+dVdCYgck5sIZFufGWQMK:67Zf/FAxTWY1++PJHJXA/OsIZeGd

Score
9/10

Malware Config

Signatures

  • Renames multiple (3636) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7395c905a3f9809218e3dcb109f958e03d98fd78cf3e58b76dd985d33df64545.exe
    "C:\Users\Admin\AppData\Local\Temp\7395c905a3f9809218e3dcb109f958e03d98fd78cf3e58b76dd985d33df64545.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2336

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1298544033-3225604241-2703760938-1000\desktop.ini.tmp
    Filesize

    63KB

    MD5

    f281d6925f263198159cce1f39fa6ea7

    SHA1

    62e4499406bded9df78b1e8c3fa72f00b7351d01

    SHA256

    f3dfcd328e64f781ef20232bf12a98f0e611a242ebf14fae25d2f7d4f5b78d87

    SHA512

    83ea7b073409042246260b2efc67a5c72303acb498ead62d6ba2b5a374cbc045ec3e4c5d3eb5640853001f6068b8ae8deda18bda7b9aec1e18d0ae52aa0d33e5

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    72KB

    MD5

    e9eeb2483c4594534b18cff7d4b15380

    SHA1

    918cd8ce88d00383c5ae82eebdcb53a1d345647b

    SHA256

    483074094d0028e7dc995ba726289638bf6acafb8254c9360423110a9885047b

    SHA512

    34e9c138288ed51ec39e59bd1fbadc128e0306067beeac60bad6b0f48cdeca05da88d5bd44dfbf84b83365cb96ab45ce574d38681b4909181994d86f7251b941

  • memory/2336-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2336-648-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB