Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 01:49

General

  • Target

    a8620e19a36b332272b147036dba06257360f8dc3b2ffea7d1978689cb16c832.exe

  • Size

    61KB

  • MD5

    7d51687ced25058f2fd928cbe5e0ce99

  • SHA1

    621e7b7eb1e772b6fcb1309322651779fc842e46

  • SHA256

    a8620e19a36b332272b147036dba06257360f8dc3b2ffea7d1978689cb16c832

  • SHA512

    5c6ac104048970af095e837e124e464fdeb78afada2400a270fd56b479d2938bff9d8888e2a388f3d8005a9c7e93a6bda24ce91ad716c4f0a3e2047dac60320b

  • SSDEEP

    768:67Blpf/FAK65euBT37CPKK0SjHm0CAbLg++PJHJzIWD+dVdCYgck5sIZFufGWQMj:67Zf/FAxTWY1++PJHJXA/OsIZ0

Score
9/10

Malware Config

Signatures

  • Renames multiple (3629) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a8620e19a36b332272b147036dba06257360f8dc3b2ffea7d1978689cb16c832.exe
    "C:\Users\Admin\AppData\Local\Temp\a8620e19a36b332272b147036dba06257360f8dc3b2ffea7d1978689cb16c832.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1712

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3452737119-3959686427-228443150-1000\desktop.ini.tmp
    Filesize

    61KB

    MD5

    35ccdd983872ddff5db1217281ce6649

    SHA1

    069954ab23928dc79bdef64591986ff6486b3447

    SHA256

    9155ac6b71a03c54c9c3bec0111ae5a665b9c56a697df7a34097d9fe1bec3bee

    SHA512

    b844f11e82a52c52326f27493293a541dc30ae85be343779e99dde618e257f1f122bb49112e5a9c6356d800fae50bf278a200a6ad239f1bff0722d771cbfdaca

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    70KB

    MD5

    029708b69ac2a33ab62eeaa27daf35a7

    SHA1

    0b371fd9446441f7a4857b5b8981680b6cb1fc05

    SHA256

    005364393f9ed3f8a7225f469a7f2b78a2eb0041f3d18493ece2f22a1839a663

    SHA512

    d6c8b31ea80039abc8c4d0064c971e3ea03cf237fb94ed76715f95454e803a642acc28806d79abd99cd62517c6c7bb46c33a20e66430dc1480643d5364d994c3

  • memory/1712-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/1712-658-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB