Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 01:01

General

  • Target

    96a828040f54253d549fe5ec616d71ac2568d7c15133104afdb80adc460099ff.exe

  • Size

    72KB

  • MD5

    8787ed5c1130b46aa3fa85d6019ea103

  • SHA1

    004a83580018b8fa7ffd124b793b46f327e4b283

  • SHA256

    96a828040f54253d549fe5ec616d71ac2568d7c15133104afdb80adc460099ff

  • SHA512

    ebdff8805a3889c1ce0ce4dc5b85c7e14471cd1cf92b1807fbeaeef46c4dcf24ffdb58bc275146ad8ffcaee956379ff61a30b057fe895112c9ad50e83db34229

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/QbUkNdNe:+nyiQSobUkzc

Score
9/10

Malware Config

Signatures

  • Renames multiple (3652) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\96a828040f54253d549fe5ec616d71ac2568d7c15133104afdb80adc460099ff.exe
    "C:\Users\Admin\AppData\Local\Temp\96a828040f54253d549fe5ec616d71ac2568d7c15133104afdb80adc460099ff.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1964

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3452737119-3959686427-228443150-1000\desktop.ini.tmp
    Filesize

    72KB

    MD5

    ebebf6e27264010e39cc6dcb4bda83ec

    SHA1

    e32cfafb991ce8631d12b898ecdcf70ffaf09526

    SHA256

    791b63e574d753eb10b0b50356a5dd299dea239687c8ffd122a7adb7cdd822ac

    SHA512

    87d369ac8f4d8d5e569b1070613b4bcdbb90962a01dbb0522a64bc0a5d7ebac3dbe628000c5953cecd6bf252603f107896b48fcc9426a969ad59494107b57556

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    81KB

    MD5

    29f901269be7569ddab154a4034f5679

    SHA1

    99f5d6a49d8490157a38dfca0c28dd7ad3dbfbfa

    SHA256

    208412b49a82609d2ddf5c601afc61c1519f882c53b72e5b46de84c48cea74cf

    SHA512

    4f95a2092367087595e46eac238be49e2c6570901ec6f6111bf5b4a9b39a013f95733deca511662f7c4eeeb4f1b6117dc93cda013b8eecafb4ec9ffa7488b25e

  • memory/1964-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/1964-656-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB