Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 00:35

General

  • Target

    8c5b2f3d95eefb5556746099ccc962aa7cb8b9c0f4c03521d4b5b92df965ac54.exe

  • Size

    75KB

  • MD5

    18b705c7ce98742369a1ab58b1a86b1c

  • SHA1

    6beb8c3ad5d904eb9c10a3ab29e3cdd106a805a8

  • SHA256

    8c5b2f3d95eefb5556746099ccc962aa7cb8b9c0f4c03521d4b5b92df965ac54

  • SHA512

    dd2fbd155a45de1357ec8d98294508b11f72b3c65d195690de303f2a18f3f4a62cbd9d31420f183838638ef49a65a4d168734ca65f9e72264d03a5326d7510cc

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8xJJMJJG:fnyiQSog

Score
9/10

Malware Config

Signatures

  • Renames multiple (3509) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8c5b2f3d95eefb5556746099ccc962aa7cb8b9c0f4c03521d4b5b92df965ac54.exe
    "C:\Users\Admin\AppData\Local\Temp\8c5b2f3d95eefb5556746099ccc962aa7cb8b9c0f4c03521d4b5b92df965ac54.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2280

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3452737119-3959686427-228443150-1000\desktop.ini.tmp
    Filesize

    75KB

    MD5

    4c470c0e97aebbcb745a23ebe9f80c05

    SHA1

    ac7076f2dad64b1187f5a342a2d56785b03f011e

    SHA256

    96f0833d56757e2d0336a18f4e76b34e9793e2caaa63d1d75089c664a92d2f29

    SHA512

    c5b323850948e2a7551fb1cfcefc3cdc5a441ec0792dcd49bf4e8061ae45e47980b7b721b09a7445a94604d2fa83fe9885fa327a029f24c1ea11f6319a7f27e8

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    84KB

    MD5

    0357030850e58d03f153ea422b908a60

    SHA1

    847e715d3f6b57090d4dc26b7028f4a40b54049a

    SHA256

    cb7c1694d3a0d1efe40f2f0affba87cfe30d1389b4809e23f2f2cd739bc3bb61

    SHA512

    6cb7cc7f2a79b231ab4de6b02f51069d02b425f2583b2bc47546bbcd2b8ff8fde02c3de8f54fbffd5e95103454d94aaa79ea32467fc4313e22b590641ee74e48

  • memory/2280-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2280-648-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB