Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    10-06-2024 12:54

General

  • Target

    6326a700f3bd449fefc1691ee4b9f64d870f352ae5f299d63df0d21b10c790f6.exe

  • Size

    82KB

  • MD5

    a64640028f2f93f486120ca4d21dedae

  • SHA1

    af1c741e1b41771ee0b358cf9f8f66b90fe4a1e0

  • SHA256

    6326a700f3bd449fefc1691ee4b9f64d870f352ae5f299d63df0d21b10c790f6

  • SHA512

    ef802bd320dfb8d294f3a134e86ed78a299afe4a9b560c002fc44f382bde5f5b3d36675c73d9607b7ceb65b447d0607de3195b545c4c72242f181207760e8cc3

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8Q8/8sYcgYcj:fnyiQSoskz

Score
9/10

Malware Config

Signatures

  • Renames multiple (3195) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6326a700f3bd449fefc1691ee4b9f64d870f352ae5f299d63df0d21b10c790f6.exe
    "C:\Users\Admin\AppData\Local\Temp\6326a700f3bd449fefc1691ee4b9f64d870f352ae5f299d63df0d21b10c790f6.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3028

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2721934792-624042501-2768869379-1000\desktop.ini.tmp

    Filesize

    82KB

    MD5

    8c124f8ebc2d19b0c61dafbc2fdb757f

    SHA1

    65ea02b715dd5cb1a6625007f099b54d92b7c5a4

    SHA256

    493cefc9de417684ec200d45ecec86e647d40ef708b1d1ea795c80507340d9be

    SHA512

    686dad0a6661305f13b3e8e7b0d8bbacccf60f9d539843fab14f0beff683d9f2f1870bf26b2b88d7878e1be84183389a351342583183f98e444eeee47cd14128

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    91KB

    MD5

    6f464a9c46e521fbab3f19043865faa3

    SHA1

    fdae804fee8ddc6e370a58f1936b01349e51189d

    SHA256

    90118c2458e00d5e69a4484c6c6baf8a13bd17491f258580bd7bb660b7ff5d2c

    SHA512

    d44e0b7939c2457da083080ec9722df4a22e8d0e6270e57e8d66a63214137dd32967f1cc8ea695f7ff1da7d167042daf99f62661161007a187b617a0c3f7e055

  • memory/3028-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3028-176-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB