Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 02:49

General

  • Target

    c5b515d0832e2e51005003f16eafbc41cbf1f7f664d38a65ef16a372f975b377.exe

  • Size

    103KB

  • MD5

    1bedc075301dcde41a16b5e76421638f

  • SHA1

    fdc0d9f81122fc92cec5b6ade620cf2b42b54138

  • SHA256

    c5b515d0832e2e51005003f16eafbc41cbf1f7f664d38a65ef16a372f975b377

  • SHA512

    3fe6ec7aac289c814076df93997915ce5e42d2d8508785c8e4d8dede6bacafe651a862877310665e420c005431940fc4bfc6ce023da83f81d2bc3a673d2172d0

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8yTWn1++PJHJXA/OsIZfzc3/Q8h:+nyiQSopQSoK

Score
9/10

Malware Config

Signatures

  • Renames multiple (3397) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c5b515d0832e2e51005003f16eafbc41cbf1f7f664d38a65ef16a372f975b377.exe
    "C:\Users\Admin\AppData\Local\Temp\c5b515d0832e2e51005003f16eafbc41cbf1f7f664d38a65ef16a372f975b377.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1952

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1298544033-3225604241-2703760938-1000\desktop.ini.tmp

    Filesize

    104KB

    MD5

    73345169fd1b64d1f480d1f66c0c7eb5

    SHA1

    149ad6f7c4f810ce16af92ed7571027c5daeff42

    SHA256

    89da06c56a94d01e314be40a7ed40de34f1d9354aac3e9f0c88541f30527975d

    SHA512

    c3d7a58e4fea917d04240b4353e9dfc0f4ae1c4011bdb0e5ea0a999dc066e5fcedf6f61f42686c914a81fcad7f751d2582d3f2d2a0cc5824b52961598a9a4b67

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    113KB

    MD5

    0170ae3609c9c6f1ecf2bdc690918db3

    SHA1

    3d21a8191ba42a96bc3102b649428141061ae978

    SHA256

    659565a5c1fa3804f36a54bc29b96cfb38d906127ff903b67bfe321cacea9b7a

    SHA512

    9bb4609eb5e50c09baa1beb1a6320c9d511f8793e037df4ac674b830b0a9a3a0a1eef7ffffbda435fbe06b8331c5aade933a274db6e0d252caa4d091cba85f71

  • memory/1952-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1952-444-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB