Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 04:51

General

  • Target

    f5cd8f594b9f956c10a581ce0cb04fb4b8f4cffd823b3ba64727654d74840dc5.exe

  • Size

    70KB

  • MD5

    2ef68ec6125b156c6fdc86e24972e94d

  • SHA1

    5991b136d1c59cfd9c543907f82df4d6c9d13754

  • SHA256

    f5cd8f594b9f956c10a581ce0cb04fb4b8f4cffd823b3ba64727654d74840dc5

  • SHA512

    2303e7c27ca90cb2ef2421cbccbbc674be8586e84a92ef42bd65e8f89d99c5a85d21701fae541298b41d4b4dd885ac5a3be6f166ef4ec668eb04dafeb7f93a8c

  • SSDEEP

    768:67Blpf/FAK65euBT37CPKK0SjHm0CAbLg++PJHJzIWD+dVdCYgck5sIZFmzWzXUS:67Zf/FAxTWY1++PJHJXA/OsIZpPEIU2

Score
9/10

Malware Config

Signatures

  • Renames multiple (3731) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f5cd8f594b9f956c10a581ce0cb04fb4b8f4cffd823b3ba64727654d74840dc5.exe
    "C:\Users\Admin\AppData\Local\Temp\f5cd8f594b9f956c10a581ce0cb04fb4b8f4cffd823b3ba64727654d74840dc5.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2984

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-268080393-3149932598-1824759070-1000\desktop.ini.tmp

    Filesize

    70KB

    MD5

    56b5dfeab4c738010230855de3ab5406

    SHA1

    7995ba33fdc2a350a81742be82b4650c97396d9c

    SHA256

    bbafebf72c6c82232d22b4fb7802b13b30f959b04c9a6692646c13e58ad15047

    SHA512

    a0953c9a996c6978fd3795b02313e79ee4fbbc123524c7dff92b7eeb1475a8e40329f1d2d08069f90acd0c1064b96c90ab31bc88e1afea23e6632007b5359416

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    79KB

    MD5

    fec407fe507e557c978416fd57f863f4

    SHA1

    84bfd260ce4f52ffe495fd673a529b6a0172a0a9

    SHA256

    afdedb61aadac30903a0d49f97f3c8f77b45820e4aee553cba836818594a02ce

    SHA512

    4812304816a4a06cc3c6979054a0808d4e424cd94ed7fb3db970dc381e6c6bf990f15f3255c4f0ba4641576741cf24989cfd283a8496cc271dc8144dc57cf798

  • memory/2984-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2984-648-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB