Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 01:38

General

  • Target

    a36e4e0954a13647fb826df37c7a9eec51a20dccfd9adadabf6cdc589a5e27e7.exe

  • Size

    47KB

  • MD5

    81296a6f4ceb041547f47c241b4613d1

  • SHA1

    2b56b0463a65418bb024eb6a0427fff5a40e404e

  • SHA256

    a36e4e0954a13647fb826df37c7a9eec51a20dccfd9adadabf6cdc589a5e27e7

  • SHA512

    76612108d5dd2205a01573b84551bc1f6dcd53480bdb5885d0892ad6c8e0bf9c33dda4b57b0521a174f7df14c7798c24cdf93a870b2a079e41a62ef385f68466

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFau:CTWn1++PJHJXA/OsIZfzc3/Q8asUs180

Score
9/10

Malware Config

Signatures

  • Renames multiple (3748) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a36e4e0954a13647fb826df37c7a9eec51a20dccfd9adadabf6cdc589a5e27e7.exe
    "C:\Users\Admin\AppData\Local\Temp\a36e4e0954a13647fb826df37c7a9eec51a20dccfd9adadabf6cdc589a5e27e7.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2128

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3691908287-3775019229-3534252667-1000\desktop.ini.tmp
    Filesize

    47KB

    MD5

    a1930d5945f6afe998a9eaf5cdafba6e

    SHA1

    095067a7803f288fcf2e7e386ac6c10740f4e363

    SHA256

    1d0ceaeffa8d1c58e1659d2a43cc25f32e8602de54aadc7db792c43144093508

    SHA512

    bf0656d555b9030a037dd2ca85c8f4fc889f1fedc946e5091a5b470a016885660bc89b71e137c237cc926aa4928006c272f828c84418a3ca53e79c252e9872e2

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    56KB

    MD5

    8a4a4cd8df3146e16ff644749aa10c65

    SHA1

    53596222acdd28452daa4937bdde1d25fc43a60c

    SHA256

    0dd11b449fdeb94d74ae9976ebb7ff240d6d3af5fd6ffb004ecfd576f2225db9

    SHA512

    0f3902e47a3a52a1ad636b6677e6b0c9e711ba8f327fa83139545a595bede44bb6dadca5b8698ef1c7043d22f565f7a5ed90116c716367599d66bb6de9d465c7

  • memory/2128-0-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2128-82-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB