Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 19:11

General

  • Target

    1b3d7946207b04ca8f8c76de1192b0d2de3d2fa9f191461759e8464ee60f70d5.exe

  • Size

    70KB

  • MD5

    5acd933a85196f99826b53cd78574468

  • SHA1

    fd01fd8940dfcc3847cc441ef7089adc3a16cd33

  • SHA256

    1b3d7946207b04ca8f8c76de1192b0d2de3d2fa9f191461759e8464ee60f70d5

  • SHA512

    147779d10b6d8b76a774615ac73d08e0839bd5b0efec4bd6b2a4b7dbacd9d9f9a760b82c6df3ac356e9a4688289c747d68cd8828896f8baf1b0054f36a7aa165

  • SSDEEP

    768:67Blpf/FAK65euBT37CPKK0SjHm0CAbLg++PJHJzIWD+dVdCYgck5sIZFmzWzXUP:67Zf/FAxTWY1++PJHJXA/OsIZpPEIUT

Score
9/10

Malware Config

Signatures

  • Renames multiple (928) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b3d7946207b04ca8f8c76de1192b0d2de3d2fa9f191461759e8464ee60f70d5.exe
    "C:\Users\Admin\AppData\Local\Temp\1b3d7946207b04ca8f8c76de1192b0d2de3d2fa9f191461759e8464ee60f70d5.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2228

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-330940541-141609230-1670313778-1000\desktop.ini.tmp
    Filesize

    70KB

    MD5

    cf11e8c57e05edd743eb2f712948103c

    SHA1

    70be342781a657ab805ce06e94d85bc5c2f7eb69

    SHA256

    016e6b72712909918372f7e741ef50e1b10fc1d79698b032e47235ac2abb84ee

    SHA512

    347677264e67e38f9c88c20a1e3049fc418eb806c99a7bb4f64d167f96170c774678bc9e40a4fc3a9b0c4b6e7dda75cef1601f7664ea9f75ba32586573e0727a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    79KB

    MD5

    4c56d0623524dd3a0006b8eea0a289e0

    SHA1

    2ee5847c134cc3bca42134ad0f4eaec9954cf2d8

    SHA256

    8bd5b58b4da817b9259be4e85258d7c04b6c12ca4e50492e4db7419d81c7b9f7

    SHA512

    ebd020f441df45a65d86e7a2c4ad8543c90288a9e39742e06a6d7981a6f29fee43133a466e87a0ef613b5fa149759968f5fefb999ad8bf9dbf9cb6905c5f7d1c

  • memory/2228-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2228-74-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB