Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 04:12

General

  • Target

    e75351d3520e6543a58c1ed5de9b63e4e130b5b7a510d170629e33f27154cc2a.exe

  • Size

    67KB

  • MD5

    1bcd71607e40c1716da0e4bd02a85ada

  • SHA1

    d5c4a5e83896eea50c7b9fa752faa11c7409707a

  • SHA256

    e75351d3520e6543a58c1ed5de9b63e4e130b5b7a510d170629e33f27154cc2a

  • SHA512

    445b12a9a5663e0f67eeaf397bfe16565ab612cff6aa47386d8aa1ba29528bb046a777ebc6f385e01366c5978d2d6a016139621cdecfe8b22622cc5cd105508a

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8f:+nyiQSoY

Score
9/10

Malware Config

Signatures

  • Renames multiple (3444) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e75351d3520e6543a58c1ed5de9b63e4e130b5b7a510d170629e33f27154cc2a.exe
    "C:\Users\Admin\AppData\Local\Temp\e75351d3520e6543a58c1ed5de9b63e4e130b5b7a510d170629e33f27154cc2a.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1920

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini.tmp

    Filesize

    67KB

    MD5

    b87b52dc81d818ced8dcbbc42b93fa91

    SHA1

    d1770130de04e9d84d6725a5a5f867072a33316a

    SHA256

    608e3aab9a1e587628fd239444ab9e129e6563125d05fd0950ab651ad5d50dd3

    SHA512

    25a56d203bbef935e6bd22e1c4cd2214e0dc05b936a9390e13d94ce75225933818ed79e5c6393e708a5f2054195d3339167ee0ef17e412dfc81f1dbdd9949042

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    76KB

    MD5

    db0279787e9fdffc8fa3b2ac24977ca0

    SHA1

    fc002386f38e155ea3097b714c8d877606c199b4

    SHA256

    068fc2713f361aad543974cd9630e01914878b1e9acc411354f53b6230a85092

    SHA512

    168e68abbe65a860191f454e5c3acefb797f3750ab3e85c7cc8d29284e92bf3da9a4ffb558694316a18b212f2476d99ad83340c687fa648e2eeadba48de22f37

  • memory/1920-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1920-648-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB