Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/05/2024, 19:11

General

  • Target

    16e34d1c02ff1cc055d035d5a751e97fe6aff7fb6b58519bbfb78961d1a63f8c.exe

  • Size

    167KB

  • MD5

    6f43311f97af307d4ad862e797439728

  • SHA1

    ecbba5bae582839fe81ff3f4b9492f553182f848

  • SHA256

    16e34d1c02ff1cc055d035d5a751e97fe6aff7fb6b58519bbfb78961d1a63f8c

  • SHA512

    596ce9596d9fd432de416624e85dab75ea6255b71aabd57b1146efe47174769a9f2906ce0845f1bed35ddd3bce9c6bdd480bcc96acc99a2ed16429e6ff80a6e6

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q1pkMJ+ZGtK1+ZGtKQNMdTajOtGtU1wAIuZAIuJBd:KQSo1EZGtKgZGtK/PgtU1wAIuZAIut

Score
9/10

Malware Config

Signatures

  • Renames multiple (4715) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16e34d1c02ff1cc055d035d5a751e97fe6aff7fb6b58519bbfb78961d1a63f8c.exe
    "C:\Users\Admin\AppData\Local\Temp\16e34d1c02ff1cc055d035d5a751e97fe6aff7fb6b58519bbfb78961d1a63f8c.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1072

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2539840389-1261165778-1087677076-1000\desktop.ini.tmp

          Filesize

          167KB

          MD5

          a8c60018b05caaec509409e0881790e7

          SHA1

          91d74b61dfc225f148752ab028a24211e4362e31

          SHA256

          b6df8eaded6f7fc80fe2f3b42a00d66daeaa52c961b2d8e6dd80c3ccc34f11d3

          SHA512

          464572133deb58dd8253e371e437d7e121a5f47f80fdf509b3b996c122483e9d626ca9b00f64e264f6190bfc2d26da9b7b1c3f6da6ce58e25ddd444aa93cc5dc

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          266KB

          MD5

          eefb5ec5c246455ab3ab0e07e5237560

          SHA1

          a0d9f34a794a16b83a697a2ae67ef7326b0390b3

          SHA256

          aa81cba001bfa4c324e6f0c03e1547036cce306a25bda11ee096e90295e6833f

          SHA512

          4446a48ded3ebec7cd44e5603d8b052fcdba4c0e8dc7e567fdaf02e4ee762669d239975f49711d9476ab63f2f3097cc9c073a57eb33e1f1ad15478e9c7b2a564

        • memory/1072-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/1072-852-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB