Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 18:45

General

  • Target

    0e7a3459bc7961a220ccac686d74c5e88eaad8b096ff5a37bd875a605fa9f8f0.exe

  • Size

    68KB

  • MD5

    0ea51e3789191515aa2401571376bd5c

  • SHA1

    df1db6ed47a49f7d59f59a5296003dc9399373ba

  • SHA256

    0e7a3459bc7961a220ccac686d74c5e88eaad8b096ff5a37bd875a605fa9f8f0

  • SHA512

    bdd1370dddfdf27374c8f9cabe756d51a7d2bb7fdd8554a1e257a42055d72a71bf72a61be746527d21539880798991d667c6918bb3b59f3059c28ad09d0aba27

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8p:fnyiQSoC

Score
9/10

Malware Config

Signatures

  • Renames multiple (3688) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e7a3459bc7961a220ccac686d74c5e88eaad8b096ff5a37bd875a605fa9f8f0.exe
    "C:\Users\Admin\AppData\Local\Temp\0e7a3459bc7961a220ccac686d74c5e88eaad8b096ff5a37bd875a605fa9f8f0.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2664

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1298544033-3225604241-2703760938-1000\desktop.ini.tmp
    Filesize

    68KB

    MD5

    2ab24977ae845d2bff56624ff1129edc

    SHA1

    18b03a188a9b4f29061a3c9cc88c3349c421397d

    SHA256

    0682c097632176afc6cc208dac6fa2d098600902422439fc60b9303a3cf51963

    SHA512

    4471058965dc933904046c889015cdd00c8ef90ad6466224b9044f86e5fc66e913bd039f1e37e7d07306331d9f6e8f298bc324e0b649b3c2c3b324e6ccf7dd79

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    77KB

    MD5

    d65cafdfa584fe4f6ec5068ba1fe7e83

    SHA1

    bed50ece9c63897163a2ab65fa4d0058aefb92eb

    SHA256

    32f77ae58a94ba2bcb9541f6fec872bb5f31cf6feebe59889cb2c4e04f6d0860

    SHA512

    722d6870cb01f61409864607e37d7cedafa24e23e878d7f2a289e41b6b5320e2c925e61341cdde750717b9f18caec49bb3cf0d8e0fc40b3e2663689c4d36670e

  • memory/2664-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2664-656-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB