Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 19:00

General

  • Target

    14978943d59801a0d1c88b1809d56b0f8864db7359d7d609e1666eca401d38b4.exe

  • Size

    99KB

  • MD5

    02c5e6bc836eec78fcf882db56e393c1

  • SHA1

    9e7c6d04386dafd07bce50bb075b451dd0dc4af3

  • SHA256

    14978943d59801a0d1c88b1809d56b0f8864db7359d7d609e1666eca401d38b4

  • SHA512

    61fdf94150028564953a20fb47bfaa2d275b6f628c515debd8f60976a054ff962ab89c4db795f39c7fa2327d559a1d1545a9646d6b0fcacacd817c98f74d7117

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfx:hfAIuZAIuYSMjoqtMHfhfx

Score
9/10

Malware Config

Signatures

  • Renames multiple (604) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14978943d59801a0d1c88b1809d56b0f8864db7359d7d609e1666eca401d38b4.exe
    "C:\Users\Admin\AppData\Local\Temp\14978943d59801a0d1c88b1809d56b0f8864db7359d7d609e1666eca401d38b4.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2216

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-330940541-141609230-1670313778-1000\desktop.ini.tmp
    Filesize

    99KB

    MD5

    e254e3d4cda29139d57eeeb678e1f1ea

    SHA1

    1c85b15fe0aea7097abddc1747f9951f4e1a90d6

    SHA256

    99275b9e03d551779fd2ec23a26a627a6a4aec56c1c178ef0a09ed48157dbf9f

    SHA512

    b994841077607fed4b361a096ad76be3c6ea8a15223c7753f95b37d44fd7eaf68d8f7c32acd54f3efc94ec0dc99a2585cb7260b917f83835114e343865aa9e57

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    108KB

    MD5

    f7a99c5bf8a7a1a8f8a4e0e6533d4a34

    SHA1

    e6ff38d31723ae73e42bb15736cd31777ec70fa0

    SHA256

    abccf190d22b537c0c31068bab8bfa72a2c8202b30ea50851f2f07cd539edd56

    SHA512

    36007b2cb3f6b639d647f5697081e33062670dcd9a78b50bf3aa340b4476957194a47f94ca3fde85e537421f138cc471d7f5c560a851519e53d3ba2d09857ecb

  • memory/2216-0-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2216-26-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB