Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10/06/2024, 13:05

General

  • Target

    67ab2d61dcf5e7de7ea098fb4a9e17e82cadff490e8c61bc7450162ca29eb4a4.exe

  • Size

    138KB

  • MD5

    5ec2ca34485f0ee837c82fd0b17226b1

  • SHA1

    022beb9d53f784b3f38cc72df9ef0ef5f929c9e3

  • SHA256

    67ab2d61dcf5e7de7ea098fb4a9e17e82cadff490e8c61bc7450162ca29eb4a4

  • SHA512

    3ae1b4a3cc1f42c255b664d39c953c40ccf04b20c9f48046540ee7ca8b5d8715c4c928d1e9581480b35bea968dde66a23b07b71125e2a40643bfabbb9639fd13

  • SSDEEP

    1536:V7Zf/FAlsM1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSC1:fnymCAIuZAIuYSMjoqtMHfhflixi8

Score
9/10

Malware Config

Signatures

  • Renames multiple (3083) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\67ab2d61dcf5e7de7ea098fb4a9e17e82cadff490e8c61bc7450162ca29eb4a4.exe
    "C:\Users\Admin\AppData\Local\Temp\67ab2d61dcf5e7de7ea098fb4a9e17e82cadff490e8c61bc7450162ca29eb4a4.exe"
    1⤵
    • Drops file in Program Files directory
    PID:360

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1298544033-3225604241-2703760938-1000\desktop.ini.tmp

    Filesize

    139KB

    MD5

    c03a1e36922c772f81e50fb6dab86cdb

    SHA1

    974bdfd2f883457929172df765cb24f9edf89145

    SHA256

    66c03a7647506d3ffb5e1c36a9e4623c5ba867fb0b2a36dbb2812ce2a5d4388f

    SHA512

    434e54474b7bbe573c731a3a934d389881d8176fe86b632b78703b78cd763ef26024b7a9545ddd94d2116b468dd12cb7e3bd6e299b8a0e607ed9cdabddc4a477

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    148KB

    MD5

    add709a0551cf30ced795028ccfb4cb2

    SHA1

    7f8ef18b19d709800d4daeec52b6312bdf224625

    SHA256

    1bc117146f39d8ffe7510dc7a70aeea723a315804fed32a47a7a8c287532d73a

    SHA512

    e5baf5bd176448e9340bb5bc84928eda4ec13d9142716749c67b048b45f9382b3dc064bbb8099dc9acc5e7071ffdbe8caaf947990065eed527918cb03d8c2430

  • memory/360-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/360-402-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB