Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 21:21

General

  • Target

    4a02142b34874b1dbea95b68a789945f2759cde311d3813f3c48ac9690adec02.exe

  • Size

    63KB

  • MD5

    3862526723fda4cd0534d02d4bd1b08b

  • SHA1

    613ace3ca16c96d4379c5367e0d277053185a535

  • SHA256

    4a02142b34874b1dbea95b68a789945f2759cde311d3813f3c48ac9690adec02

  • SHA512

    e6882b87a46d6aa1d3552ff3db4cb177234badbccfae7ecdab7ba49302ce0deef3a06b2df483bc84c689c963916b29a67165ce5068664365f1b8f2fa4afa7732

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8O:+nyiQSox

Score
9/10

Malware Config

Signatures

  • Renames multiple (3588) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4a02142b34874b1dbea95b68a789945f2759cde311d3813f3c48ac9690adec02.exe
    "C:\Users\Admin\AppData\Local\Temp\4a02142b34874b1dbea95b68a789945f2759cde311d3813f3c48ac9690adec02.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2072

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2248906074-2862704502-246302768-1000\desktop.ini.tmp
    Filesize

    63KB

    MD5

    6e99b7e427b1ab3449f7613c9217d727

    SHA1

    fa200e2bb19af02074b607556f1c6a15dc4f05d9

    SHA256

    b93ddaf9cb3383f5bc7a4415d3f4f33da5b65b1422eb0243dce6b14776eb0364

    SHA512

    71a8f00c15f28c9a6cfae67d47a846a32b75a4a08b866aadb910ca5fc6deea83f2632a37d349773acb7bf26dc68807a319c2e835c31b51a068723da25b9d7d72

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    72KB

    MD5

    d78d817404ccd35eed67e435415df4b6

    SHA1

    22714fc92db2dc3c89cc894911a0569d776012c1

    SHA256

    7aca7e4066de6c2e2a4d12f213aad2d2c631096f23bef1c0f264f4dd3830eb7d

    SHA512

    97a3a4a5b3f033fa168a4f3e2b05bc55acace4da2a30f3019ea1ba42c3438338af7fb62491ca602c75d5a4c81662c2cc85e8ca8331b95796f41d6296e66d0e64

  • memory/2072-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2072-650-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB