Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    29-05-2024 03:25

General

  • Target

    e34d46115b71a46c8b4aacc04e149f7853051bd978e8108317ef133d63992077.exe

  • Size

    52KB

  • MD5

    7b2a015924d0c41732211c970b575344

  • SHA1

    0d1fd47a80a14ccef3eb264e09e6754be3072387

  • SHA256

    e34d46115b71a46c8b4aacc04e149f7853051bd978e8108317ef133d63992077

  • SHA512

    8a8a7198d4b116cfb0694cfc954579cd64d28ff6a8b9ca3a6c8a114ee68dd4dc5da780d492ad9e054a61d598edcd94b73ff56e540832eaf617cec4efb38acc81

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFzD:CTWn1++PJHJXA/OsIZfzc3/Q8zxx

Score
9/10

Malware Config

Signatures

  • Renames multiple (3705) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e34d46115b71a46c8b4aacc04e149f7853051bd978e8108317ef133d63992077.exe
    "C:\Users\Admin\AppData\Local\Temp\e34d46115b71a46c8b4aacc04e149f7853051bd978e8108317ef133d63992077.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2056

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2737914667-933161113-3798636211-1000\desktop.ini.tmp

    Filesize

    52KB

    MD5

    cfa72ba33926c7c6534e55ea1f432231

    SHA1

    ac98832b49e5a79ffdaacdce82e2ca077e9fcfb2

    SHA256

    77f47025133bbbd670e24cfdb0d5ef1ac1ccdf1d0a3f08137b9fc49efe041572

    SHA512

    0139bb6c3e3a57f3a6295fa0ed970fe82f05f4c531603036f456bdb40cc8ac05fe32487f4dab684c86afe68a6ebaad47b7b8d04fc4f5ce137f7d950cfff7822a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    61KB

    MD5

    250748b65a189c09af68bf6db97fd241

    SHA1

    5c32f68f99cfe9c7daec97c4e4be2c4065f2fba8

    SHA256

    b6972398a9c9f3445da65a191469ebe01fb824dd52c6e37a91ad210650006e63

    SHA512

    ae96c4a1f95e2ffbdc67fe1365086da05c5f2a163ec6dbff9b58bdfe26a0865ccf8cb26d39678a9ef9fba6412b686ffc22c79418f280d848dbdab7fbad8a07e6

  • memory/2056-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2056-86-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB