Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 01:50

General

  • Target

    a8626e3d6a692f5888fad9c917d96af6814fac73305b4e665051985ec0acecdc.exe

  • Size

    70KB

  • MD5

    2f8c0d05ce9f47d6ab1fc36a9c47097b

  • SHA1

    08cc620095523a86a063e39259260279a2b17958

  • SHA256

    a8626e3d6a692f5888fad9c917d96af6814fac73305b4e665051985ec0acecdc

  • SHA512

    4ef7bd03dcfe51b1c6b33459278bda1ae167c54875a77d0b448ee95374a8233d84f1dc06c4ca40fbde15ba9dd4977cf51541c8a6c0420c055d5be239b565b270

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8asUs18/8E:+nyiQSohsUsOkE

Score
9/10

Malware Config

Signatures

  • Renames multiple (3445) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a8626e3d6a692f5888fad9c917d96af6814fac73305b4e665051985ec0acecdc.exe
    "C:\Users\Admin\AppData\Local\Temp\a8626e3d6a692f5888fad9c917d96af6814fac73305b4e665051985ec0acecdc.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2936

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2297530677-1229052932-2803917579-1000\desktop.ini.tmp
    Filesize

    70KB

    MD5

    22fbde9dead81e07ec00738399c0bcf6

    SHA1

    c51973cfbdde852aff5e6b92d0f98100511e2e66

    SHA256

    7f4fc5fa116a4ff83f29485a4d6074d46092bc96c7fb00a36bc449501e711e46

    SHA512

    9742012bb8565908cb9c285b463dd8c4c214c2bbe5241e48e04a60b8c93685c87ca03c32fe5a861656185db19b0c74f81057b29b4fbac697fc9397d0b5a93f25

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    79KB

    MD5

    994fa96707c04ef2d54e04055358b59d

    SHA1

    d5a5d9bc18e5d7f9f72534e778504f38e3f1d60c

    SHA256

    aefaad44e7ce1670fed67a0627b013b4b053f2e0eacdb0ebbf8ed1803e4b3b02

    SHA512

    a00f34aad2b5199941c6af4459f9ed7e86583ba2bb88e75fd80a14bc7409fdc5066310238a23f2a473e4a715efa675602195f2e71026077c41c2866da8697685

  • memory/2936-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2936-648-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB