Analysis

  • max time kernel
    150s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/06/2024, 23:25

General

  • Target

    79b297076e1f21dfcc15b0d920ece14923dc352fdaab5694e55c7754d5613d5a.exe

  • Size

    1.4MB

  • MD5

    4dd7ae5435d11270483ae17414f51789

  • SHA1

    94bb6ac20dfc9a5d3825f208beba137a7efc9df3

  • SHA256

    79b297076e1f21dfcc15b0d920ece14923dc352fdaab5694e55c7754d5613d5a

  • SHA512

    27dc7418f27e235fc01484ab0ce1c6fe65a5a119aef83fdd39a99ebe9fc1c53f704e3e54cfaa0ba8cc21d0f5cb186c02b99399f8b7cda5d45e6565a14b9d25be

  • SSDEEP

    12288:IAIuZAIuOVdo4Mxdz68XUdWnGsTefBAZUNHPK5ywHeG5QuKfeoy7UNCfwnmocDQ7:NVdo4Mxdz68k3IESsKDQbhEEoQv

Score
9/10

Malware Config

Signatures

  • Renames multiple (1825) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\79b297076e1f21dfcc15b0d920ece14923dc352fdaab5694e55c7754d5613d5a.exe
    "C:\Users\Admin\AppData\Local\Temp\79b297076e1f21dfcc15b0d920ece14923dc352fdaab5694e55c7754d5613d5a.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4824
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4292,i,11746347647270949551,7786733067759450703,262144 --variations-seed-version --mojo-platform-channel-handle=4028 /prefetch:8
    1⤵
      PID:1632

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\$Recycle.Bin\S-1-5-21-1181767204-2009306918-3718769404-1000\desktop.ini.tmp

            Filesize

            1.4MB

            MD5

            8cb03c74f3e91e3ab54a2c4353373599

            SHA1

            6aef66ba138dcf656e424a3637f9a738de111ac6

            SHA256

            a7e6f5d1dbeeea267125501d0aad1959ea7852f630cdd620d48e04b9b5c42dad

            SHA512

            cbcb7ff8b44ca9a22894c8168c118a4e64077eabb70dbe6b0ba89359d4a2393c49cc0e3f3a429fa866549a62376ea94735f4cd827c84db68725d8a75d971a209

          • C:\Program Files\7-Zip\7-zip.chm.tmp

            Filesize

            1.5MB

            MD5

            a55619aae43f838c6dfd7f9122a4d05c

            SHA1

            49c0b64ba62862b7ed4c50558fde84db2e7aa53d

            SHA256

            fe91b62e0cb8250552d1b9d028a7aefb73ab32a63d0727433b36eae36b72a26e

            SHA512

            747df9ecb671d1e0e37ae98a794134677035e8fd76909ae48dffcaf443f1fef263fa446c1945c40c3f0de989c1e95b67d077c000f21ba012879b548b2c14c99e

          • memory/4824-0-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB

          • memory/4824-712-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB