Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 20:20

General

  • Target

    329c7346f801e23cc8afca146c1a6fac19df48fbccb9f40856a4b97efe50f3d2.exe

  • Size

    120KB

  • MD5

    7c5fa50d1d4244879335af7927f5b53d

  • SHA1

    5e60767a985b3f86932c1acbe0172d7ca198b7ac

  • SHA256

    329c7346f801e23cc8afca146c1a6fac19df48fbccb9f40856a4b97efe50f3d2

  • SHA512

    7ba2d2421661d6eca3aaa977731c24c1f821c90083e13e974f6a1b3b04eaa9a749f320a670bd7d359872c0dfa3aa0537366c43fa3e9bb7967ef809b270004dcb

  • SSDEEP

    1536:67Zf/FAlsM1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCR:+nymCAIuZAIuYSMjoqtMHfhfU

Score
9/10

Malware Config

Signatures

  • Renames multiple (3438) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\329c7346f801e23cc8afca146c1a6fac19df48fbccb9f40856a4b97efe50f3d2.exe
    "C:\Users\Admin\AppData\Local\Temp\329c7346f801e23cc8afca146c1a6fac19df48fbccb9f40856a4b97efe50f3d2.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2220

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-268080393-3149932598-1824759070-1000\desktop.ini.tmp
    Filesize

    120KB

    MD5

    a339f1c5a6effc16bff987cbe4488b8f

    SHA1

    f16e9181e1b168a6c51fad033e7db22a45da2880

    SHA256

    697ceafd8bdb2078ade4d2252c50fccc629a26e44f13c6ab323cc78ebfe7cec7

    SHA512

    e9ab3cfc0fb92156d6933ad216d86911b91aa1a82022cc1e295da8d213cf42e157d3cf8068eb47d9ea3ee79603e57255c3e9b7c6ec5dbdca5fe7bd2976d79423

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    129KB

    MD5

    0ca151e2aafe6353c74720616fe0a674

    SHA1

    da48307b17e756f7eec3a5208c5b92be11cae0af

    SHA256

    b55452a9270089b8ce68d55f76d1081a4afee68079a204310abfb35b0ea273aa

    SHA512

    cbb2df0eabb5ca0a87c509c82253fb3c2e603e7cbaa79cdc824651fe8674974e22d8ccc3aa44f8d39a99011a5bcc390b34b8b5878d7dd90b8a4c1ddb87c9602b

  • memory/2220-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2220-608-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB