Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 02:04

General

  • Target

    adff37181edf470e9c2264c36ba4ac06d93637b5ee3e828334f15d313da70ab1.exe

  • Size

    47KB

  • MD5

    7ac3bf90a567e854ddc613952630c329

  • SHA1

    1a2488349d22272ae0170be1c6489e0ef2aa908d

  • SHA256

    adff37181edf470e9c2264c36ba4ac06d93637b5ee3e828334f15d313da70ab1

  • SHA512

    75597fc34c8102693fef0ca18bf2b52eb359b292de89030dcfd1fee36d739c2bcf326c7c129c47b737f37881acc98e42d9cfec4c3345b9c5b139024905bd1762

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFan:CTWn1++PJHJXA/OsIZfzc3/Q8asUs18t

Score
9/10

Malware Config

Signatures

  • Renames multiple (4133) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\adff37181edf470e9c2264c36ba4ac06d93637b5ee3e828334f15d313da70ab1.exe
    "C:\Users\Admin\AppData\Local\Temp\adff37181edf470e9c2264c36ba4ac06d93637b5ee3e828334f15d313da70ab1.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2400

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2737914667-933161113-3798636211-1000\desktop.ini.tmp
    Filesize

    47KB

    MD5

    2ff1b8440beeffce8112f6003f8d63c8

    SHA1

    1511a17b1cc579647c58e32b69c2646e0077078f

    SHA256

    8f3c99c36083d77de1d3eed6c7883af1c8838fe791d6a0b8d7ab1004551c0801

    SHA512

    797339f41bc6e4ecf65650cbf7f2f3f3c5e2dc6943eaad8377446e9d1c3bc75dd2b87d82d6d54b52431595b9e00d359e7670967830b9d19fa3add1f86a2af8ae

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    56KB

    MD5

    7b16e6833125fcabec87c88a8f494b68

    SHA1

    53c5206d35bf9ad70a9135f5d0e9efe03060a839

    SHA256

    c3c80542db56a0679069f35ff06a79915d64fe14fdd75d3e133c3a341706e464

    SHA512

    17c0057818f50e5336bd0a1d86d95c7b5fb011ccf86a4dda886d6acca4da3a4f0c98d253e8f022e4390a09bbe210a4b456554d9867082d50be9177da8d597ecd

  • memory/2400-0-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2400-86-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB