Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 01:57

General

  • Target

    ab0ea4b1c2d3e5d710f98a3c4890a1de9aed0327d2ce23068236bfe5d06f507f.exe

  • Size

    62KB

  • MD5

    135651f92099ee916426bbe64c409965

  • SHA1

    697b452e0b2c0e4f54fc70f1f6f6453d8f69701b

  • SHA256

    ab0ea4b1c2d3e5d710f98a3c4890a1de9aed0327d2ce23068236bfe5d06f507f

  • SHA512

    bdc3cf148f71fabc00304ffab004c9427967e130073412bc284bf246fc97d3ce4b96c2790f3dc15b83a05e813538c1653cfff3b7e51bb8a74daaa7869100842e

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8A7:+nyiQSot7

Score
9/10

Malware Config

Signatures

  • Renames multiple (3459) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab0ea4b1c2d3e5d710f98a3c4890a1de9aed0327d2ce23068236bfe5d06f507f.exe
    "C:\Users\Admin\AppData\Local\Temp\ab0ea4b1c2d3e5d710f98a3c4890a1de9aed0327d2ce23068236bfe5d06f507f.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1160

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini.tmp
    Filesize

    62KB

    MD5

    1a7fb1ce0cccac006e53799de1da79eb

    SHA1

    9a46d68043f0f7d028aa0187355fdc4f7fad5048

    SHA256

    32dd0e356101d1d0262d71e9efdb078db91212789a5a57991330b212364bcae1

    SHA512

    c801e5b3ee0359037a73ae758e5d8a3ab9206846fc79cc1f045def03476c40cf27d7c6258d51a173b4fd1de25c400b82a46fdafd76db567381db4ac14cc21686

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    71KB

    MD5

    046e1f92664fe564034ecfdd7c09a100

    SHA1

    07dbda49d9bff120ce758fc21350ca4ab8a542f7

    SHA256

    25336303f4d2bfa1bef23c446cbeaa8faa711025df6ec9a2d7835e61aa2ab4fb

    SHA512

    c4b7d1e1eb763e0e6c11f80ce9870c3d34368ac80bb6386b6e25923795e818230425c6ccc0a4fd2abc8d30bdf4930f93e2c3731a381d68a1c6aefcb427e5631d

  • memory/1160-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/1160-528-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB