Analysis

  • max time kernel
    150s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-05-2024 01:50

General

  • Target

    a8626e3d6a692f5888fad9c917d96af6814fac73305b4e665051985ec0acecdc.exe

  • Size

    70KB

  • MD5

    2f8c0d05ce9f47d6ab1fc36a9c47097b

  • SHA1

    08cc620095523a86a063e39259260279a2b17958

  • SHA256

    a8626e3d6a692f5888fad9c917d96af6814fac73305b4e665051985ec0acecdc

  • SHA512

    4ef7bd03dcfe51b1c6b33459278bda1ae167c54875a77d0b448ee95374a8233d84f1dc06c4ca40fbde15ba9dd4977cf51541c8a6c0420c055d5be239b565b270

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8asUs18/8E:+nyiQSohsUsOkE

Score
9/10

Malware Config

Signatures

  • Renames multiple (5017) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a8626e3d6a692f5888fad9c917d96af6814fac73305b4e665051985ec0acecdc.exe
    "C:\Users\Admin\AppData\Local\Temp\a8626e3d6a692f5888fad9c917d96af6814fac73305b4e665051985ec0acecdc.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3248

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3906287020-2915474608-1755617787-1000\desktop.ini.tmp
    Filesize

    70KB

    MD5

    0c1003db88ef7ea1ebb57c8422b0fafa

    SHA1

    691324c25465f66a287a760c74067dd62e449028

    SHA256

    138274dc602aeb80c7b8392166867e660c10ff3a715e9b909d552bf5dd0fe4cd

    SHA512

    61e55be3dd01a9a2dfe0bab6fc67abd8024e8d63f76291aebd5520b1b764a0876d328fe27d1573f133ef44a19a8dc801a23c4ec6036a62c2b653e135decfff96

  • C:\Program Files\7-Zip\7-zip.dll.tmp
    Filesize

    169KB

    MD5

    a9efdad24305c032d833dd487c9658a8

    SHA1

    17189da19ad338a05c014d4b52e1693ecd8374f8

    SHA256

    7c2d23149fd176e70de3cd18ae56bb3bfeb023e082a9a7eefc3cb5e4cbe93275

    SHA512

    f0cba79d90120ce1554a631a901149b9d5bfc14670925df99d5f5424f78e1ee02046ac9452d987f08b05daa690962fec06788d57d958c5f9b1e7e7f9a69392ac

  • memory/3248-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/3248-1788-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB