Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    02/06/2024, 21:42

General

  • Target

    4cc85d19d8fcd37373ad75e670b7d5380438b71692813739f8aa8c7b810d0cbd.exe

  • Size

    170KB

  • MD5

    e7466b9fa46170d20050bbbfa3e73dab

  • SHA1

    625751b8f34a8f6694ce62bb6c95eb4c600fa5fe

  • SHA256

    4cc85d19d8fcd37373ad75e670b7d5380438b71692813739f8aa8c7b810d0cbd

  • SHA512

    9ffb9b2deb29cbca26b40dc95d88d863da2e8c9431069b60a7552b2f4216bba317bfa79ddf003f8664f7383ff1b36f87e0ca24892a0279068639d1e0a7bfac92

  • SSDEEP

    3072:fnyiQSo1EZGtKgZGtK/PgtU1wAIuZAIucSarSaF:KiQSo1EZGtKgZGtK/CAIuZAIucSarSaF

Score
9/10

Malware Config

Signatures

  • Renames multiple (3261) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4cc85d19d8fcd37373ad75e670b7d5380438b71692813739f8aa8c7b810d0cbd.exe
    "C:\Users\Admin\AppData\Local\Temp\4cc85d19d8fcd37373ad75e670b7d5380438b71692813739f8aa8c7b810d0cbd.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2404

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2248906074-2862704502-246302768-1000\desktop.ini.tmp

          Filesize

          170KB

          MD5

          a2dbead60bfe19fa8eeef44dd6f2dba7

          SHA1

          04c374c0b3c40f602b12e6c687f777c81fa6ca68

          SHA256

          1690604672674f3e0a0bcc7e3f6540b86b8d102b8f21287d51230b33ced7c8f2

          SHA512

          8e3ba05aa5bc466f5102ebdf73fcbcc1a57cfe11581c82f3fcfe5d9a3ee622a7dd4e5aac3249c1d528280ddd89d1e824ae04fc26ff9e459917c2a399d3fffb5f

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          179KB

          MD5

          62547447e27ebf65b027bc6ed5d0307b

          SHA1

          3c8fab0c71f81c94a4a915e145853bfec0c6402f

          SHA256

          8077932b8ad0b2439a4a25f11e7f2054d92cf4985045da592de5ccbbb31af920

          SHA512

          4033764dc721c7022eec9adbc8de1172cae72194fe9f4a799f2344d3b02848c26d076fe02a469c8be42306417bfef86863ce40bba1d58e9935444a0f026084a4

        • memory/2404-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2404-640-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB