Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 20:39

General

  • Target

    3a609f21121cdf04023d78f68280496292373e32fb1aefa75448a520e0629052.exe

  • Size

    51KB

  • MD5

    8b1c98687ac632adaaabe0a53250fe08

  • SHA1

    a5e0583290f068010710bbd65412c976b9cb8046

  • SHA256

    3a609f21121cdf04023d78f68280496292373e32fb1aefa75448a520e0629052

  • SHA512

    b39054d74de2fb677952575473b8fc0377a3d874afcde6004fb555950213b6f66f56c209e5be696eac26c335a324fccade2ac24fbe9cdc68abc76e4bb4a83cef

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFFi:CTWn1++PJHJXA/OsIZfzc3/Q8yi3nG

Score
9/10

Malware Config

Signatures

  • Renames multiple (3732) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a609f21121cdf04023d78f68280496292373e32fb1aefa75448a520e0629052.exe
    "C:\Users\Admin\AppData\Local\Temp\3a609f21121cdf04023d78f68280496292373e32fb1aefa75448a520e0629052.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2188

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3452737119-3959686427-228443150-1000\desktop.ini.tmp
    Filesize

    52KB

    MD5

    03b8b4fe8cb6e760709516ec0e266a98

    SHA1

    d12e4a40887333f335eaf5b58784b2c7b14ac740

    SHA256

    9173c31062b775fc159675ef42e8c07a288a6a0b8e5dc471ae7e23763c51eed5

    SHA512

    efa0ea75d8ff17b1a0faaeca9fa5201c08c8726ec42cf389a0ec4a8432bba589220891879cebede947cda1a399360507449128f2fb937b84e6ca4ad8773e13fa

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    61KB

    MD5

    28ca8ad18b0a4ea6e58f2deb1ed9a7e4

    SHA1

    acb31a5b8a78ab61a53d4bf589d9ee1641e6bb8b

    SHA256

    6ce9110af21e388d5fe2c022252b338bdcfc7b2698a0387c5da3b3405837441d

    SHA512

    1901555eaa882f692ee6b0996b93b87079c3dba9821c0553dc95cd6c248a5fef098620ca2d9786206ca9077805645486b040598d35f29e68ff0410c95d34a6b0

  • memory/2188-0-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2188-76-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB