Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 00:37

General

  • Target

    8d6615f905e9e105a6d7fed9bb682352d21aeb005879855997ea22ddb468f8f3.exe

  • Size

    100KB

  • MD5

    7b93b040d8539f6a541ca742d8670d8f

  • SHA1

    b3e2719d91c7637c554e1b6d9dbceab8645cc200

  • SHA256

    8d6615f905e9e105a6d7fed9bb682352d21aeb005879855997ea22ddb468f8f3

  • SHA512

    d650a3c32e28413737fa1c89d530e9b78094469fda3a98d9eb1f7a8d98b0b92a8903d44b4c2e191c48f242f21a166076dc3709886cd237394f961b637fe8cad4

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfL:hfAIuZAIuYSMjoqtMHfhfL

Score
9/10

Malware Config

Signatures

  • Renames multiple (3523) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d6615f905e9e105a6d7fed9bb682352d21aeb005879855997ea22ddb468f8f3.exe
    "C:\Users\Admin\AppData\Local\Temp\8d6615f905e9e105a6d7fed9bb682352d21aeb005879855997ea22ddb468f8f3.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2852

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2721934792-624042501-2768869379-1000\desktop.ini.tmp
    Filesize

    100KB

    MD5

    8e93600d743132f376109785ddc5bf98

    SHA1

    b27ecaac4f569418c9854e4e337f2bdaeaae8600

    SHA256

    d32ebd46bde3b79f514431662cbd744618d1009bf8dc79df6c116798f5ec2b23

    SHA512

    95c3f762f0fed7d6f1beb82879e3112fc383519a51bfed7a16499f81e5a96b505f142d53fe309ea42d96dc55b13bcc586f4fe9364b3a73a9d3ae11bd0834ecde

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    109KB

    MD5

    533796da7b521d69037d6c6d72113e73

    SHA1

    429cfc7ed7f5fac96b3f67b19cc0c0af7c3c0449

    SHA256

    48a03fe3016454a1eba41ecbc3ab59290603ea1a26f4ddfa714f71bc945ebfc0

    SHA512

    f05e0e132fb8dc7a566ad249e2c9bd6b8c9bdbe505f40ee5564b002d78f30f240366731a7c6b5b2f778afe65e8690cdd5ee4c7ed43e9132ca0e48c343ffb7835

  • memory/2852-0-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2852-86-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB