Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 06:13

General

  • Target

    fa8de58d621af97295e74441dd3467cb551773d24a49dcd0c9a069f5bb3e7cbd.exe

  • Size

    97KB

  • MD5

    2bc531a3f81217bd96860e8e54e89fe4

  • SHA1

    adbee703bbde51289e81805b9c80cafba17f4743

  • SHA256

    fa8de58d621af97295e74441dd3467cb551773d24a49dcd0c9a069f5bb3e7cbd

  • SHA512

    35688a0a170979f5a2bc251d020dccd02be1157db19c7a4c1f91b44446c77169950e5dd78b29152f89ac04efdd5b49beeba731084b59250b454fe744fced99fc

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfa:hfAIuZAIuYSMjoqtMHfhfa

Score
9/10

Malware Config

Signatures

  • Renames multiple (3442) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa8de58d621af97295e74441dd3467cb551773d24a49dcd0c9a069f5bb3e7cbd.exe
    "C:\Users\Admin\AppData\Local\Temp\fa8de58d621af97295e74441dd3467cb551773d24a49dcd0c9a069f5bb3e7cbd.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2604

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-268080393-3149932598-1824759070-1000\desktop.ini.tmp
    Filesize

    97KB

    MD5

    7f80455e5f873cdb68301dcf3feffa4e

    SHA1

    8098591dc66b286e0e5a313b3b13173b2cfb17fd

    SHA256

    1f667fe92c7bf7ccad639b0178526648c4aa5843e5fb3cdafa4e4945e19927b1

    SHA512

    d9a915666bf4915c26499acc62a62a089b068dc511a95b8ebb744fd12f811317586dd81b5e33f72a02d9f401759b7556c5d007b0f2519d00cbda9a31bf8ccf30

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    106KB

    MD5

    617e435b8e303c1f9c39a437c4db2564

    SHA1

    15faa527577e6deb6bec5554ff1e42a8aa1b547d

    SHA256

    dd8044abd2bfdaca95bea955e4ef723100eeb6ffb9f47c553b1ff06d37206046

    SHA512

    d989b5c454086f725241eedb6afe3baf73f8c8c944deb75f76f9410197b670daa1bcd189f40db0217d284c22fae1a559c25a34a913c26246364c0c4de6825ff7

  • memory/2604-0-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2604-76-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB