Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 05:31

General

  • Target

    ebd36e1bf766c1cb93499cda7f49f77ef51c60d46d856a12a19e168b393e4b92.exe

  • Size

    129KB

  • MD5

    358b9e825c4824e9913b7461eae21b08

  • SHA1

    fdb58d4fd696489f53b8c765d64a36210d2e0864

  • SHA256

    ebd36e1bf766c1cb93499cda7f49f77ef51c60d46d856a12a19e168b393e4b92

  • SHA512

    a87fc6c1da737c3f0bce7653c2c5cefafa2e8ab41042de561ab921ad0c0ea1dc19b385eac1c1a7e65f410811a8dd58f55fdd2d977e3b61b4f29db16eb2a600d4

  • SSDEEP

    1536:V7Zf/FAlsM1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCe:fnymCAIuZAIuYSMjoqtMHfhfU7JK

Score
9/10

Malware Config

Signatures

  • Renames multiple (510) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ebd36e1bf766c1cb93499cda7f49f77ef51c60d46d856a12a19e168b393e4b92.exe
    "C:\Users\Admin\AppData\Local\Temp\ebd36e1bf766c1cb93499cda7f49f77ef51c60d46d856a12a19e168b393e4b92.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2776

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-330940541-141609230-1670313778-1000\desktop.ini.tmp
    Filesize

    129KB

    MD5

    ed89fa6ce0ec8a61723c6d20c477c672

    SHA1

    b39455b6bff8ae85055e914cee9a485c70b16a15

    SHA256

    ec56e692f8a817b65b3440a93aba7308d72569a2b6cf1553d46ea88ed2fb3699

    SHA512

    22e0f7101f6be7bdb4ba6c97571ba02840e7e89fdc050c0f0ca287cc50d96c2eff87ba0cd182b808555429b2003233bcaaa04f63c7b7e848e0a0ac9bdec3fe5b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    138KB

    MD5

    516c5cdb77fdc2d727076f72420c14aa

    SHA1

    2a27ee0b04c8ff2b08ad53538a539ff207e26a67

    SHA256

    9dd059231a7f63053ac0777e16ad9a837a18e0648d94d9a76f5b8d70ff217f85

    SHA512

    34b18b5ce57b9814c16c0316ed74355e056b31069578a7171174c79b4277ae88916cd1fe6f2a379f339162351fd8dabc24a9e4237839193fd6abb0c10a84a3d5

  • memory/2776-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2776-68-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB