Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    02/06/2024, 22:44

General

  • Target

    61f462902cca52648d40e43ae227b5002ea99ef71ccc1bcf62bd57b5a56a8b3f.exe

  • Size

    127KB

  • MD5

    dfb42a94d2134dda7ade56463d571c9e

  • SHA1

    3ffb9e64b767dd693c2c1eb320915a66d5712adb

  • SHA256

    61f462902cca52648d40e43ae227b5002ea99ef71ccc1bcf62bd57b5a56a8b3f

  • SHA512

    b0cbeb42b15b090b6850290f4e53dd50a24671c5e5d8f8d78c6b492dab84457dbeb6623ae56895815dfbd7937b497a961aadbd3d7c63a802448a37eba6f8a975

  • SSDEEP

    1536:V7Zf/FAlsM1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCC:fnymCAIuZAIuYSMjoqtMHfhfr

Score
9/10

Malware Config

Signatures

  • Renames multiple (3262) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\61f462902cca52648d40e43ae227b5002ea99ef71ccc1bcf62bd57b5a56a8b3f.exe
    "C:\Users\Admin\AppData\Local\Temp\61f462902cca52648d40e43ae227b5002ea99ef71ccc1bcf62bd57b5a56a8b3f.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2284

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2737914667-933161113-3798636211-1000\desktop.ini.tmp

    Filesize

    127KB

    MD5

    5da20ecb74d4111306b557aca98f4bdf

    SHA1

    1b2fd6afd992c6a23d7a53767ee026ad94c196fc

    SHA256

    eb90594d84b594385a4c3fe6a4f98576198a6af0e69f7c496db72426fc8b25a0

    SHA512

    cc408ebd3083f9eed4f10f1d08aaa011c12bbc23b9bfb699d59c209178bedb5c5680dfe2e42b4449daa6fd9602d0978840e4781577e94d2b8323c80e1a84c63c

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    136KB

    MD5

    fe722fa41a1eaf63d5a31deaa92b5fde

    SHA1

    44d5409f2f7495e6a405da396a6d284a7b72e454

    SHA256

    2518957be11f9696e37b550bee183de6675bd8138bd88e181228440aa76bd28c

    SHA512

    20ffe5d63851a66ede399452722ea109bf0e31a27153f03c49f9ce9be80f0ad39447527b7a20a376f89057616e355447e7539c2c005b02c018aaadd4e959eb1d

  • memory/2284-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2284-358-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB