Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 03:49

General

  • Target

    ce69a0bcdf5bbdf2a8384c2febddd5db5c93ced14428a783a2fbf775caf0a863.exe

  • Size

    121KB

  • MD5

    24f73f6d539f7aa0708d3ed780d533f1

  • SHA1

    2157d892f5b1545fb94a5573369fc4389b148cd5

  • SHA256

    ce69a0bcdf5bbdf2a8384c2febddd5db5c93ced14428a783a2fbf775caf0a863

  • SHA512

    4a105b25ccb905e68f853fba9b03ff2f1c006464637ebd65d7112d886c7b334b847b7a4ff0dff20793dc3e3e71d043eddbe47ecabb8eced627d5cf7e56a18545

  • SSDEEP

    1536:67Zf/FAlsM1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCS:+nymCAIuZAIuYSMjoqtMHfhf3

Score
9/10

Malware Config

Signatures

  • Renames multiple (554) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce69a0bcdf5bbdf2a8384c2febddd5db5c93ced14428a783a2fbf775caf0a863.exe
    "C:\Users\Admin\AppData\Local\Temp\ce69a0bcdf5bbdf2a8384c2febddd5db5c93ced14428a783a2fbf775caf0a863.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2244

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-330940541-141609230-1670313778-1000\desktop.ini.tmp
    Filesize

    122KB

    MD5

    2582cad46af9e38613bdf0f04aa5e252

    SHA1

    c4dcc172bae18cbab3670e9fb6f9ff64da6334c5

    SHA256

    61cb5e685bbc7679c407fb4ebb0fb8f3eca3c932e6e5b80f2053bda12a351fe8

    SHA512

    9fbcf63699b2b64db746875cc025b8da17471ca85ea236f7253b27bf37de28241150f7f5e91f4ca21a2c36f8b41ada37340797996ea1fab5f009adf0e44ac096

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    130KB

    MD5

    5898b108edd522b7a5efbadf6ce9e591

    SHA1

    e9989d8805f9bbc82c4876af13cbf184649c0694

    SHA256

    6e67e775d4390297874fffc2d7f04b853cd3f9d7f0765de205681d83679064b1

    SHA512

    8f0d0ca069a7cba3dbc4f1f3c471f3017f3ba307e050434c132f605aa7eaf9de7ebc6850cc42ec92f77b7c9659525b4288bc7a93c60be40001bb7abe8c8543d4

  • memory/2244-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2244-74-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB