Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 04:52

General

  • Target

    e2844a55ccdbb2f66f04f6a560ef834f0fda2d8ac62fad517b3e544bc0607026.exe

  • Size

    51KB

  • MD5

    159c80f749a33cd22d66d34d71b1c473

  • SHA1

    11005accd36c6fd2a9cfb0f979761bf5f22b9edd

  • SHA256

    e2844a55ccdbb2f66f04f6a560ef834f0fda2d8ac62fad517b3e544bc0607026

  • SHA512

    f80a7666fc3f8967bd9075c575e275a6ce6f3db07d17b07f7201f1fe1c6630f132038978a377efe76d6809bba5b5b2a009e7a3155f401a44c1fd44663f2c3c6e

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8KTcTSbyEmOTcTSbyEm6:KQSodTcTSWEmOTcTSWEm6

Score
9/10

Malware Config

Signatures

  • Renames multiple (3764) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 3 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e2844a55ccdbb2f66f04f6a560ef834f0fda2d8ac62fad517b3e544bc0607026.exe
    "C:\Users\Admin\AppData\Local\Temp\e2844a55ccdbb2f66f04f6a560ef834f0fda2d8ac62fad517b3e544bc0607026.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1724

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini.tmp

    Filesize

    51KB

    MD5

    aadb453b2119e82039e35ee20693ae7d

    SHA1

    9e7c2ca84b2c74f40a7a10588d483d7c372a0571

    SHA256

    c3521f4a627c3d79f69f70acda032820d0412ddd514a52a682a5f38118a7cc71

    SHA512

    5ad79967279261db53a857702327b0af8e274de5a62d2d51d77015c078fbf90c8743b432614940e394354a94fb234aef70744c86acb16d307e0cbcde8421c975

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    60KB

    MD5

    f6b7f3dd20bd3a77977736bd40b77e8f

    SHA1

    e8a97a16ec1aefb2d5d19fc931773948e4a5b50a

    SHA256

    ffacbac8e8f164e6455a4cec2a73378147c659bcd3ec1b719622fa5d1bd27103

    SHA512

    0ff9cd1f31b8096504d945f69d85e2cbe4a385bcf13928ba25e962f04b4382d0ad671f17f698dfd1b83fa92080b09112537acbc84529e4ec1a14f8020a070302

  • memory/1724-3-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB