Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 06:19

General

  • Target

    fd6de325a6cb4725cb642872c12848538c22f209841f76ead9222f6e490ec012.exe

  • Size

    66KB

  • MD5

    484a1ec667a50b308098a4e5cb29de56

  • SHA1

    e51f2d8c895622d984ba4ce311e0a696698257c9

  • SHA256

    fd6de325a6cb4725cb642872c12848538c22f209841f76ead9222f6e490ec012

  • SHA512

    a8d242ab20c1cccdffcb74b30977ede72c3d669d023d3dcd41e1d3f2dc7769c500b29ef50179a33034d2a37a52cee1834fbd66128402db44217b4951e8a45973

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q81osbosO:+nyiQSoaXO

Score
9/10

Malware Config

Signatures

  • Renames multiple (3458) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd6de325a6cb4725cb642872c12848538c22f209841f76ead9222f6e490ec012.exe
    "C:\Users\Admin\AppData\Local\Temp\fd6de325a6cb4725cb642872c12848538c22f209841f76ead9222f6e490ec012.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3032

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2721934792-624042501-2768869379-1000\desktop.ini.tmp
    Filesize

    67KB

    MD5

    ffb7a4daa2c2ebf25ff9f4ab1e2518ab

    SHA1

    656c01b41e965282f9436c4b8c260faede0bfa76

    SHA256

    fd0647c3fe20e58c1ad45e08780f57fa5005ead5529469600cab9fc17d37d524

    SHA512

    c2b670c675a51136a281d2f8ac0793c97f74fca60ec1fc5addedb165595222df4e451da0ea8bd78830ec0c9f6f340e58a486454529eb87298863f3c0d0ea92ca

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    76KB

    MD5

    a97337b52472527465297fad145b68ec

    SHA1

    aadf6e045f7ced9f4d61e34505ede54ba1b68f0c

    SHA256

    b15f8f82be6cad442a009d061fd7c926f35ce5a4a0a2d1c127241ec814ec2e98

    SHA512

    cbac5ce5740ca2352b4853dc12489181968a934201763d52fe0bb5f3974b7dfa11879fd9481a12bbdf18e5f7b54fc35b6904ee0eb6391b15e667d86069a3d22f

  • memory/3032-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/3032-644-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB