Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 18:46

General

  • Target

    0eb44cde84ca20af2a41111f988361dc326c29d1227723d27593f517b4221a0a.exe

  • Size

    96KB

  • MD5

    492a0b9f53bf0a98fb0983bfd16f2267

  • SHA1

    5cbe4257948788f3e1354df96e06be246fa52d0a

  • SHA256

    0eb44cde84ca20af2a41111f988361dc326c29d1227723d27593f517b4221a0a

  • SHA512

    c537aa78a6285346eee46fa4025360c11872755cdd40ee4a80852d76a99fecef27225b66f27b4b482938aad93ca9dadd85cea93daa6eb3843fcecd2b3f667487

  • SSDEEP

    1536:a7ZyqaFAlsr1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdS1:enaym3AIuZAIuYSMjoqtM1

Score
9/10

Malware Config

Signatures

  • Renames multiple (3444) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0eb44cde84ca20af2a41111f988361dc326c29d1227723d27593f517b4221a0a.exe
    "C:\Users\Admin\AppData\Local\Temp\0eb44cde84ca20af2a41111f988361dc326c29d1227723d27593f517b4221a0a.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1756

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2248906074-2862704502-246302768-1000\desktop.ini.tmp
    Filesize

    96KB

    MD5

    6900b9ce44e519f63b573ce6094f6746

    SHA1

    75027da826d0f26d97dae518be259bde02e50108

    SHA256

    16a89d66e4d89a448c8fdaf9bb0c2bf896a32845c5365b2efc22d8c4557fd3da

    SHA512

    807a8a3e811c5a84340af16de9356327d093cfab7061b4b3f5927c0512164639050fe5095faf8693805bb27f3c17184dc62b03fd0b37acf90dfe7f9434158959

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    105KB

    MD5

    be6e277e9c94219f73f2781667a2b489

    SHA1

    a25f4b2b3ce1a9dfa06ffaf6dccad73551fb68cc

    SHA256

    fc0c2823f8a184c0d1abf1649e26a7950127a8463449f111c5e68462cb751fda

    SHA512

    a64b4bdd4ccce952a0b8d1433203258fd5e16a5007841a45f0dd580f03ae5c738e36f31be7451434de7ac0e0d8464924d5d33b25b7d6fdfa393a4eab51accb54

  • memory/1756-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/1756-648-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB