Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 05:46

General

  • Target

    f0d748a8bd6eb30384e806d85f96f5c8239a04a98bf7854fa5e3b75c086e484a.exe

  • Size

    203KB

  • MD5

    6ad7f41f17462bd1fe645a2f27e89eb2

  • SHA1

    2b022478631ac63d5b4d3bfeec26eb5f0e745788

  • SHA256

    f0d748a8bd6eb30384e806d85f96f5c8239a04a98bf7854fa5e3b75c086e484a

  • SHA512

    7695c1426082dffa4182a9b9dd8ac775c664618e25b2c2961193039ee71b4a5333e86ea24a9c15cdc8291ce4edf5842afaea735f9a1fe9e76ca983853d669f5a

  • SSDEEP

    3072:enaym3AIuZAIuYSMjoqtMHfhfJ6W2QZwKS7sSE:wHm3AIuZAIuDMVtM/L2ZKS7sSE

Score
9/10

Malware Config

Signatures

  • Renames multiple (3172) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f0d748a8bd6eb30384e806d85f96f5c8239a04a98bf7854fa5e3b75c086e484a.exe
    "C:\Users\Admin\AppData\Local\Temp\f0d748a8bd6eb30384e806d85f96f5c8239a04a98bf7854fa5e3b75c086e484a.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1676

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-268080393-3149932598-1824759070-1000\desktop.ini.tmp

    Filesize

    203KB

    MD5

    00fd3c713252b2bf7291a7dc5ebbc31a

    SHA1

    8535e37f72ed40f1e340b32012a24ca4f20b4d80

    SHA256

    4a9181aa6d89233d3faaec650ce7d4f7059073449ab01af0d1358dc4ed203b13

    SHA512

    3eb27e5403a00f111e0bcb0517a2f990922ddc77ef532b83ebcdc7e06e121236689113f6ebcb029c427dc0aecf439bfa32d53520738b477eae0a0965294a27df

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    212KB

    MD5

    2e2addc48616bb15448a64a8dfe97e9a

    SHA1

    ab0cd7e2fd4558391548d139f48f16389170e3ae

    SHA256

    8b4532f0d07f9bb3ed2a675ca2288d46e7ce08fbf1a1aab5b04aa3f2dd0f0733

    SHA512

    e1c67186013b93258ec3459b24416ce9e5d271ffcbd4cf89063f8c8f6d115f87193eaf63db332a9be5c3c26b7c33894ee3247b27a96e8fadc18a2431e340cf7f

  • memory/1676-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1676-470-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB