Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 03:11

General

  • Target

    ced67669da149155b2dec1a541ec9596850bb52b6b07bb9f0b17242e597ece00.exe

  • Size

    97KB

  • MD5

    1a307ace8d3bb56789a2e59992299fff

  • SHA1

    c9e2041042e9501aea2868c0d8aa31e7bbf30a52

  • SHA256

    ced67669da149155b2dec1a541ec9596850bb52b6b07bb9f0b17242e597ece00

  • SHA512

    6b4a7695e3d256ac5e9e85c1b137577a4c1d079e05f79e1b2389833ea243b0ef7edae17e20aa8dec19511f7ccab40177ce8199bb052b8129c2859936da9d3fcc

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfh:hfAIuZAIuYSMjoqtMHfhfh

Score
9/10

Malware Config

Signatures

  • Renames multiple (3454) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ced67669da149155b2dec1a541ec9596850bb52b6b07bb9f0b17242e597ece00.exe
    "C:\Users\Admin\AppData\Local\Temp\ced67669da149155b2dec1a541ec9596850bb52b6b07bb9f0b17242e597ece00.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2936

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-481678230-3773327859-3495911762-1000\desktop.ini.tmp
    Filesize

    97KB

    MD5

    306ea29fe5273a1c54c9c426ff66c98f

    SHA1

    4d74be2475b1524f7eb0f0696172f9a64cf56760

    SHA256

    e8fc4df992f6de3406921b266ec8f56f040ed9237d1fdcae56b62e1b290dd289

    SHA512

    51c87fc8f156f93b89d406fb7d4f52c6cdd4b1279a148e377726993cec56d026f79e6d390ed4f4b23f98b4382d06094a70eeddf32a3d2b394c43bac7d6858730

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    106KB

    MD5

    9b030829fc35ea0f15f750fa0a7a4261

    SHA1

    4cc3b9e1c5f001280b18eaf4f0e5221a7f2a51db

    SHA256

    528d718517ef8aed4d0a2ac6f7d76a3a5762cde8fc5d12d1be9519e88e1588f3

    SHA512

    89d5c5439a424da73dd1839e4f1ed5a683173a10e22f449b4b142ca0b55f6a7743bcb29b7c90dfe6dfc9eaec2fdf4dfc7909e5a0506e3f6d224a6433bf69fcc9

  • memory/2936-0-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2936-76-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB