Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 18:55

General

  • Target

    14bfca54cf97bbd0a043e9b4c4441a194bd1fa1d711bd2639a01a74d3c1cf1d2.exe

  • Size

    210KB

  • MD5

    3f813b51c26d1a3af8b6362de15e4c96

  • SHA1

    91f229391b0e4e6e08cea709485d1ad449fedc5a

  • SHA256

    14bfca54cf97bbd0a043e9b4c4441a194bd1fa1d711bd2639a01a74d3c1cf1d2

  • SHA512

    a9e3963b0cc1385bf9e07b320881f5e7139a908926f8ffdc731fbce23026a6f8383ef7644ac10d8f74151c6fd6867694caed93a9a523f4b1be47bf7e376ef28d

  • SSDEEP

    3072:enaym3AIuZAIuYSMjoqtMHfhfA6W2QZwKS7T:wHm3AIuZAIuDMVtM/y2ZKS7T

Score
9/10

Malware Config

Signatures

  • Renames multiple (3134) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14bfca54cf97bbd0a043e9b4c4441a194bd1fa1d711bd2639a01a74d3c1cf1d2.exe
    "C:\Users\Admin\AppData\Local\Temp\14bfca54cf97bbd0a043e9b4c4441a194bd1fa1d711bd2639a01a74d3c1cf1d2.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2820

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini.tmp
    Filesize

    210KB

    MD5

    555fd4145fcf396a3ccc92ff13a7503c

    SHA1

    e5b90f9043d7fc7297bf68548500af2aa3cc128f

    SHA256

    cadc4b3021a18b7546edca0f3b06993ed98d461467fa6a3184a25dae68365644

    SHA512

    bdf7a45a8c6451b5a92c6d91fc12d75a58b358149e2e3945c0c301c0d350ad8b502457ef7918e201fdb51c5a47009a61cf824e8ee9d8155f27644b7072f6529b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    219KB

    MD5

    a5aed02c5bf5c04b9fe0d8a2e34b5fb8

    SHA1

    a2d2a54793c0053ebdb43c35c56c97eba8af117b

    SHA256

    7c342ee06b5aa1ebfd1576017bbb4e0b006f927c5a10dbe8233fb92886bdd309

    SHA512

    14591fdc5d12a660f418caa68e9d7a03fc22a240ab68f15468f1f161ba7a488cbdbf38ff123232fca92cd2eb2e21d351368f5ae88e34eeb7fbc82f79ee8058f1

  • memory/2820-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2820-526-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB