Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 02:48

General

  • Target

    c633bcc73e050283da7455256090729a754c59fa7635211caf38764ea4514935.exe

  • Size

    111KB

  • MD5

    249f717a57ab49043a653346999e379e

  • SHA1

    38be4ed07e8bcfd81d8114ead5babde30bccdbb2

  • SHA256

    c633bcc73e050283da7455256090729a754c59fa7635211caf38764ea4514935

  • SHA512

    bd8d30e0fef51f84704f38cc30875e50f2f3038691059f7215611d38bc90e71233d03c32ef5cc8b92df90a847c7d6ac8e154fada5637227603415ea578ea523a

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hf0xx:hfAIuZAIuYSMjoqtMHfhf8

Score
9/10

Malware Config

Signatures

  • Renames multiple (3444) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c633bcc73e050283da7455256090729a754c59fa7635211caf38764ea4514935.exe
    "C:\Users\Admin\AppData\Local\Temp\c633bcc73e050283da7455256090729a754c59fa7635211caf38764ea4514935.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1660

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini.tmp

    Filesize

    112KB

    MD5

    44b0c240e11ea636617945987dab8f18

    SHA1

    af19b59942769bd7f0981a232ab229a376a02073

    SHA256

    a92ea2d1ca5319474363d8e277b86dfa7c716df8f0094f69b0e1a5ec2aa5fb4d

    SHA512

    22e6c21f598045aec92a77ed79f09153e1b9d60f24edfbb646719584a71df2d28e6b232610e226c67177d155a5f341919ba263929f32fee7e7f427a7eecb01dd

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    121KB

    MD5

    675c48f85dd9e98e994a211dadc49ff3

    SHA1

    552d42ffb3823aa258d432056c2351ed94641094

    SHA256

    9876358a733c84d80e9d750d45a38787cba4c08a3502297c2cc01436fbcaf63c

    SHA512

    d282bb148db9e8985dbfca83af75653847855113e1151663d06969fd60b3070a10c91d06b760f1216d578058c473f2ed5e30facbec3022f324c1048141446cef

  • memory/1660-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1660-76-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB