Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 05:38

General

  • Target

    eec030190704c1cf027597325a58004beb7cc27b0bb7c214498512d750adfde5.exe

  • Size

    73KB

  • MD5

    338cbe1390d1ba02421bb4dcd3837a13

  • SHA1

    29d9686e199cc511daf1fb7600f2f26d45c51c86

  • SHA256

    eec030190704c1cf027597325a58004beb7cc27b0bb7c214498512d750adfde5

  • SHA512

    d45a8c29bdcacb8f8b895b954ba472e0ad747749df3ee7880290702da4a45a2516b0f60c599c34d38950bce7fd71e4508a1e8b8d0e12914464a4684255f51ee5

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxt:fnyiQSoO

Score
9/10

Malware Config

Signatures

  • Renames multiple (3686) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eec030190704c1cf027597325a58004beb7cc27b0bb7c214498512d750adfde5.exe
    "C:\Users\Admin\AppData\Local\Temp\eec030190704c1cf027597325a58004beb7cc27b0bb7c214498512d750adfde5.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2416

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3691908287-3775019229-3534252667-1000\desktop.ini.tmp
    Filesize

    74KB

    MD5

    d98dde5d2f24140c0a770b7d78aa0b63

    SHA1

    08e6bd177e515346a7275a51f4948db5a321ed2f

    SHA256

    57eed21acaa747f866b8ed6cdb39460a5302def2a597840b96cb039c79b60da4

    SHA512

    bd6d6d7bc3cdccdd58d246bad9ab862ea672a942c0c54aa5407b70c6190222d103213ca505cfe1120adc30e864c4668e8be2dac1ebfdb80ff2082d9dec9c8ef7

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    82KB

    MD5

    f6a00f798e0daf74fb391025e1e0ccbb

    SHA1

    766d7e4a7c86ecb373db213dc2de7d5c51a8fde0

    SHA256

    a9cb3ce73b6740b19a7e471653ed5c1670fcc2cbf913385a8f708e5a67d54c50

    SHA512

    6235098ef7c7bb57d7fda4cb49ba42b0b53fbece0226a55adfd7d3dd175507a4cb812569c000102cd563743fba1fd19e21bf25e85bb659d36060b69604a65785

  • memory/2416-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2416-652-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB