Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 23:42

General

  • Target

    7c4bf5f1ed308b763a658fcde0eaf4c0a840cc25ec88c2427276afc44e23e393.exe

  • Size

    41KB

  • MD5

    3997356a7e1e14c0641edac9d73f7ad5

  • SHA1

    348f477c9142bb6a0091edf1b4ffbaa0d12f05cc

  • SHA256

    7c4bf5f1ed308b763a658fcde0eaf4c0a840cc25ec88c2427276afc44e23e393

  • SHA512

    1bc72dd80d0859ce553b4862ef3bbf03d65ae23927fb96989e8df91d1c9468881f90e7a43df6753e97f7b6481f25a508a0dca32a0ccab0fd81f861fff3917cd7

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFw7:CTWn1++PJHJXA/OsIZfzc3/Q8O

Score
9/10

Malware Config

Signatures

  • Renames multiple (3863) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c4bf5f1ed308b763a658fcde0eaf4c0a840cc25ec88c2427276afc44e23e393.exe
    "C:\Users\Admin\AppData\Local\Temp\7c4bf5f1ed308b763a658fcde0eaf4c0a840cc25ec88c2427276afc44e23e393.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1520

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3691908287-3775019229-3534252667-1000\desktop.ini.tmp
    Filesize

    41KB

    MD5

    5588652fddf7081e1892ab72d02f7c71

    SHA1

    a0ec3432cb33574eee9abc651a6077d1f38d7490

    SHA256

    8bb063a5402df9671f2381f25f7743d74895f069e2773807dc462e35713a7048

    SHA512

    7c6d00f1e65d8030aaad6491f93710805483112dac8508626c7d988be010eb08cc78db38b31a9499e4bebd260e0e6bc4ee62f0f12ae141c16c26ce20c41c9607

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    50KB

    MD5

    65fe6b9514f2be8c311087f1e4e3365c

    SHA1

    7cba38b03cec1a048c9fedca53fcd1cfaf32d534

    SHA256

    1de8cbcbc920e0546d0aa77853706189408f52a9321398ae3998980f03b65888

    SHA512

    842ac75bbc2f78e2d0bcdf880589918c4f4aa141dd7ae333c0ac6d0fe1695e22e598f98d8f46457e73e859964d0de33f4a6728000a879294b35ef905b2695c86

  • memory/1520-0-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/1520-86-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB