Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 21:19

General

  • Target

    4a1f08041ea213d211d22ee3b4c380886a221ce394d59f2845037b098e2271a7.exe

  • Size

    73KB

  • MD5

    5b409b566fe31b289dbae2a81e6442cf

  • SHA1

    7e02fd7302d659b6be7dc3a43db580d935d2cec5

  • SHA256

    4a1f08041ea213d211d22ee3b4c380886a221ce394d59f2845037b098e2271a7

  • SHA512

    8ce75415b0fbebddc6a08a27003f847233e898fc84e6f265e5c064fd61177f96b5d1ef8919508b26961f9bced490ff5f6b3f4e69cc088830c1b63167b871095f

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/QbUkNdNI:+nyiQSobUkz6

Score
9/10

Malware Config

Signatures

  • Renames multiple (3454) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4a1f08041ea213d211d22ee3b4c380886a221ce394d59f2845037b098e2271a7.exe
    "C:\Users\Admin\AppData\Local\Temp\4a1f08041ea213d211d22ee3b4c380886a221ce394d59f2845037b098e2271a7.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2380

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini.tmp

    Filesize

    73KB

    MD5

    d6abe1603ec7e1f1ac5aef98272d8194

    SHA1

    5c92d62a57f31cbaa10155ceae25c9c19e3c3e16

    SHA256

    9610b13d8997126b31dde70a661458d72aaeb3289b10dfbb7860e4cd40d6caa9

    SHA512

    07e3065bb84aba25661f2234984a55df0e383259358ce2a659d24b867b178d37aaecb7c0a76add3014d334f92ee4707ab59ca966455900061c6865d18587fd6e

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    82KB

    MD5

    4d1af992d26bdee9af900b30d6cff5e8

    SHA1

    029f6e5497919b5c31c50c4f798b8ff99fe8eeda

    SHA256

    7d894ea6ab5e0dae3b7b34e1936a4680a7d231e4ee63f98fc4b974d9f27cd7cf

    SHA512

    96ffb8e918d885eaf9ac8d5ff138b50643a61838b81e225ec571fd24768415db58181158b069a0f84c69f9c4ab7cf0824d53ec427aa5485568d6d7c9606209b3

  • memory/2380-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2380-636-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB