Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 21:07

General

  • Target

    450db42ec387724b3979f81561727dff5b68ef9c9cfd0a50e38197474c1e2944.exe

  • Size

    149KB

  • MD5

    0e2235b576253d56dab6bb43ac954e31

  • SHA1

    ac44c5b3c65a9fdbb9aaec3f653401278818d1a5

  • SHA256

    450db42ec387724b3979f81561727dff5b68ef9c9cfd0a50e38197474c1e2944

  • SHA512

    a57b0241a3db39024021c7ae8cf82d857aa5a0ddce95a98057aec2935a36a815a13e6db193357ac750081a529e69a174be77003dbb286f1254fc779a1b7da865

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8s316u0MXo7Rwcz6G7wb/G0CIvXZ9yhHe:+nyiQSobuBhe6MiIqWLsUu3ih

Score
9/10

Malware Config

Signatures

  • Renames multiple (3285) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\450db42ec387724b3979f81561727dff5b68ef9c9cfd0a50e38197474c1e2944.exe
    "C:\Users\Admin\AppData\Local\Temp\450db42ec387724b3979f81561727dff5b68ef9c9cfd0a50e38197474c1e2944.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1928

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1298544033-3225604241-2703760938-1000\desktop.ini.tmp
    Filesize

    150KB

    MD5

    3f457fe8891a41b49b0003716e2a5474

    SHA1

    fd1cdd1a7bb91f98e2cda835dbef62d892f6381b

    SHA256

    780e51b5cd5aece3fda96cb5cd03057efbafe62b532ddaac5587d69ede1d56fc

    SHA512

    151fc5dd9bf0aeceb933cafc9f388dccf804a0262a48df15ed1d8da0ee1b979d65cefa5f646e35b540b5ce50c44a51dde6b6670c8b485935cd72d6226f2e2787

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    158KB

    MD5

    21f51e6452845af5578650d4f4353d8f

    SHA1

    95cdb560d9c26a93d6ca1622f5fa77fdb6e91647

    SHA256

    8f7ba4077abe72261eee06d548eb766a04c4ae9f2f1fae39ddac166cf5019f71

    SHA512

    5dfd15db16094a1f2395294e23b501bf8c30949469010c750a59b8e91dc3d52eef66bcb4ddd149a32f1cd72373a51886d65e490ec92002cfda13c2fc6a3ab1eb

  • memory/1928-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/1928-520-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB