Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 21:21

General

  • Target

    4a02142b34874b1dbea95b68a789945f2759cde311d3813f3c48ac9690adec02.exe

  • Size

    63KB

  • MD5

    3862526723fda4cd0534d02d4bd1b08b

  • SHA1

    613ace3ca16c96d4379c5367e0d277053185a535

  • SHA256

    4a02142b34874b1dbea95b68a789945f2759cde311d3813f3c48ac9690adec02

  • SHA512

    e6882b87a46d6aa1d3552ff3db4cb177234badbccfae7ecdab7ba49302ce0deef3a06b2df483bc84c689c963916b29a67165ce5068664365f1b8f2fa4afa7732

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8O:+nyiQSox

Score
9/10

Malware Config

Signatures

  • Renames multiple (5148) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4a02142b34874b1dbea95b68a789945f2759cde311d3813f3c48ac9690adec02.exe
    "C:\Users\Admin\AppData\Local\Temp\4a02142b34874b1dbea95b68a789945f2759cde311d3813f3c48ac9690adec02.exe"
    1⤵
    • Drops file in Program Files directory
    PID:388

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1337824034-2731376981-3755436523-1000\desktop.ini.tmp
    Filesize

    63KB

    MD5

    98b9ddd92411fc08ce26f5faa2d1ea0d

    SHA1

    d323aad9037c831e74a4c572382779fc9f3b1700

    SHA256

    269fc1248a506618525b9bfe4d195daa61f44429d626d7eb91e97fb702f0982c

    SHA512

    35394720762e1c8d1e82601b94af18bfa0504e58ac724eb23569373694ef1871557f9fa5cbd8185cf23c0625c0506bc45850374b6e0900315a34e385c71caee0

  • C:\Program Files\7-Zip\7-zip.dll.tmp
    Filesize

    162KB

    MD5

    b12c62603c50037800fa6cbcbf81720b

    SHA1

    054460ab79f76f7d7bb45170d45565abcf3b8564

    SHA256

    705769adc35755fe87df4b969ca2cec80aa165d67c08af01215b9e8ddd90cc07

    SHA512

    961aa8a30a5864b5e72ed51e47afa3c344f5e5e2e90271e1163d58ab33f4d5f749b654ca414a46d5cca6677d8d83f99956bd0a3d6cdb1b889d91880cfc193feb

  • memory/388-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/388-1882-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB