Analysis

  • max time kernel
    150s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-05-2024 04:12

General

  • Target

    e75351d3520e6543a58c1ed5de9b63e4e130b5b7a510d170629e33f27154cc2a.exe

  • Size

    67KB

  • MD5

    1bcd71607e40c1716da0e4bd02a85ada

  • SHA1

    d5c4a5e83896eea50c7b9fa752faa11c7409707a

  • SHA256

    e75351d3520e6543a58c1ed5de9b63e4e130b5b7a510d170629e33f27154cc2a

  • SHA512

    445b12a9a5663e0f67eeaf397bfe16565ab612cff6aa47386d8aa1ba29528bb046a777ebc6f385e01366c5978d2d6a016139621cdecfe8b22622cc5cd105508a

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8f:+nyiQSoY

Score
9/10

Malware Config

Signatures

  • Renames multiple (5278) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e75351d3520e6543a58c1ed5de9b63e4e130b5b7a510d170629e33f27154cc2a.exe
    "C:\Users\Admin\AppData\Local\Temp\e75351d3520e6543a58c1ed5de9b63e4e130b5b7a510d170629e33f27154cc2a.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4712

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2539840389-1261165778-1087677076-1000\desktop.ini.tmp
    Filesize

    67KB

    MD5

    975416cb19d620cc2f12d65fc13c1cd4

    SHA1

    fe22882c3ae07b27c3835d018ac88f78a5f1af1e

    SHA256

    84e12f7eb00964c25b3e9ddbc2b6ef34fe277eac7c0fdf26383a2e3eab27642d

    SHA512

    7b075d95ce98ac95d2e3b5a3f045745bf94116c7517b13844722ee3b68f286a765b038837d38fe7bdddadf000dc316d18cf9375a2fc2a25f6ead2b7e0b1bd232

  • C:\Program Files\7-Zip\7-zip.dll.tmp
    Filesize

    166KB

    MD5

    803cad589aad57b08bcccacfae60ab8e

    SHA1

    d0207e08adce0ba0f1b64431594c96630c7b56a8

    SHA256

    70e0577edc2e7ed2600246e79a48760408b7794a3eec184f86cdbfd852fb7b48

    SHA512

    559c7b77b08c670cd3f6d361cbde3cd2b1a3162bba99a31a31b9aa1d69499938a20829b6ea6285cf955ef75c4cc2354c5ebc1a37885c12afadec67b6527e7b15

  • memory/4712-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/4712-1958-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB