Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 01:19

General

  • Target

    9ce52f2f72507f4e3776c1346ef2150cb743874795ed56d94ac3cd39473664db.exe

  • Size

    43KB

  • MD5

    2cbc215a225a0aa2bb28c59e97245d21

  • SHA1

    bec683ce978c57f38ed4430bcff9a1fd84066642

  • SHA256

    9ce52f2f72507f4e3776c1346ef2150cb743874795ed56d94ac3cd39473664db

  • SHA512

    646ae3d6012eb54ec4c0dbccad8abb4ce96a6519c4abf3b762be6a5cb570024567a53b81ca54609b1c5711b65aedcde1a083df6554af2e213e47977512c6f369

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFzg:CTWn1++PJHJXA/OsIZfzc3/Q8z2xlxr

Score
9/10

Malware Config

Signatures

  • Renames multiple (4066) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ce52f2f72507f4e3776c1346ef2150cb743874795ed56d94ac3cd39473664db.exe
    "C:\Users\Admin\AppData\Local\Temp\9ce52f2f72507f4e3776c1346ef2150cb743874795ed56d94ac3cd39473664db.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1620

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-481678230-3773327859-3495911762-1000\desktop.ini.tmp
    Filesize

    43KB

    MD5

    cbc7d31092ad5e56dabde4f3ba2ee9fc

    SHA1

    45daf16b9731134ca965312c1f39961d27a3517a

    SHA256

    15629a84eae8b273495a81cce9c586d38cb38978336f8a84cf0bcaae09093cb9

    SHA512

    087612b0c8933b7b0e51d58e3f7a7bca37507d43386a690f08516950aed0ba351569b26abb9cafe282c84cf1c24f6e2c027de990e363540b0bc847355231b0c4

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    52KB

    MD5

    5c6e07a9749a92f4ea2ba1c371ecfb69

    SHA1

    ac24762a65df0469648bad3a043c503cc0ffb00d

    SHA256

    e10734693efbaccf055547522496042812cb10d3bc87dbfb62c6e8135bbf0691

    SHA512

    ec0ae6c452872fd85e9cfa470cb2adccf44335f2b4a5f413f73d46c7a5e34a74f23331b5208b94283e3501806657640acb790294c5c0d11ffbb23d9f161bd0e2

  • memory/1620-0-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/1620-86-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB