Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 05:34

General

  • Target

    ed2c00bbe014b94636a1040ca4bd527e9a7a2c0d9b06f927ca5dfb68fbcd2c7b.exe

  • Size

    122KB

  • MD5

    0d2b3468041afbadcc6e24a647532600

  • SHA1

    5a6a977f7e97749f74b39241e574300c0fb8c6ba

  • SHA256

    ed2c00bbe014b94636a1040ca4bd527e9a7a2c0d9b06f927ca5dfb68fbcd2c7b

  • SHA512

    c76e80ebe44ada63b3b58bf36a29c1e6fb76a8d3d54ea88032e3cee75203a74b63020f6ed5562a0a3236dfdbee706b183c1da2def5aa62f3223bbc306f45b911

  • SSDEEP

    1536:67Zf/FAlsM1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCB:+nymCAIuZAIuYSMjoqtMHfhfk

Score
9/10

Malware Config

Signatures

  • Renames multiple (3454) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed2c00bbe014b94636a1040ca4bd527e9a7a2c0d9b06f927ca5dfb68fbcd2c7b.exe
    "C:\Users\Admin\AppData\Local\Temp\ed2c00bbe014b94636a1040ca4bd527e9a7a2c0d9b06f927ca5dfb68fbcd2c7b.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3012

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-268080393-3149932598-1824759070-1000\desktop.ini.tmp
    Filesize

    122KB

    MD5

    32b6f32060727dd8b8b890ef4dcacf06

    SHA1

    6a13d9c005c56d7b1d42930efcaafa2e055b2497

    SHA256

    1eaee6f86df15d9267d2bdd0d4f1b6e73f95143a78b0e862ff4d9fad311d1e7e

    SHA512

    c28499856d6d28af26146351e61bee35fc1fc2587e32319920a3207523392067e44a0ba504152b379ba05d2ffe7bcf5f27e3509180f363ab51874f5e49f8b40d

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    131KB

    MD5

    6811d16ca819a64636516d7a9a746d1a

    SHA1

    ad68a5531099a303ea5ede117f1f756b2ff5958e

    SHA256

    f6b89236502757db1e471e9545c6d05a34b324bd984a01ac23fc2839a20c5078

    SHA512

    c0a1b4381c8016ac45acfb2cae7601f6f9c8cf49a85d7e637e60044c16c1799bde8c14df1d43f092515468d212de540bf378bf862f35bf2e1e99f10e4d791e05

  • memory/3012-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/3012-646-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB