Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 19:49

General

  • Target

    28269a9ce95e0e431ace85cf387e9b0c814cce0e114027d89acacab21245c904.exe

  • Size

    70KB

  • MD5

    0a3d901108b33758c19774e0ea327726

  • SHA1

    bde15b374e20dd34b134d6a406215353893df4e3

  • SHA256

    28269a9ce95e0e431ace85cf387e9b0c814cce0e114027d89acacab21245c904

  • SHA512

    3b556601bac6f3bc70aaec7a04e4f13173a5af211eacfe1a99376785d8d4758f2eaeaa9828a16a8fcbf8f13e40d290b14392e2d93b24caa51f436a1df988f6df

  • SSDEEP

    768:67Blpf/FAK65euBT37CPKK0SjHm0CAbLg++PJHJzIWD+dVdCYgck5sIZFmzWzXUT:67Zf/FAxTWY1++PJHJXA/OsIZpPEIUn

Score
9/10

Malware Config

Signatures

  • Renames multiple (3452) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\28269a9ce95e0e431ace85cf387e9b0c814cce0e114027d89acacab21245c904.exe
    "C:\Users\Admin\AppData\Local\Temp\28269a9ce95e0e431ace85cf387e9b0c814cce0e114027d89acacab21245c904.exe"
    1⤵
    • Drops file in Program Files directory
    PID:492

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2737914667-933161113-3798636211-1000\desktop.ini.tmp
    Filesize

    70KB

    MD5

    8244e937c321286853c72a872ac047ef

    SHA1

    42ab57e7b9648ac55d80d435a144b6f781807940

    SHA256

    e538e2e192156df61d96ee0581ed0360f141d47635f9b8c276748947887da393

    SHA512

    a09047bb2118a6a515804861a316ac883a56f477b416bd1f379bd870ac497516962deb100908437cafe84eefdb42c95388131304b8ffb919f685171b4a09bd16

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    79KB

    MD5

    ff81485dfaa0a1a7f8d5506af90f78b3

    SHA1

    78ccca3cdeca33b554e7a110d6ec3aa0c6af56aa

    SHA256

    c84756267eb7529c89e76883770a5771bd5112a7cb9267ffff4ec9f878e8db64

    SHA512

    ade1c83f0578113056176a0583e87f58f89390f41e9af02a86f3f0ecce1a80f1427ea398697174410c468e2b68dedff2780d8465520d3a9abbbebe064ddb208c

  • memory/492-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/492-630-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB