Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    10-06-2024 19:04

General

  • Target

    eb30856e7473bfc9ed0aba76874146c8864be2547f9d5ae98b39ae0eefd6075e.exe

  • Size

    113KB

  • MD5

    fa15ff775c696192145abfa4a9ad604a

  • SHA1

    c5c917f0165e49e78b74236f6c5c3a59dae26791

  • SHA256

    eb30856e7473bfc9ed0aba76874146c8864be2547f9d5ae98b39ae0eefd6075e

  • SHA512

    03a9a77cecf543af702a709a3392a474e1131127a673f931ccf11d738c9f63bf92952eccb0cc2e33c078d0b666036c58ed4871c2d180a246e0f93562efda8e74

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfagM:hfAIuZAIuYSMjoqtMHfhfagM

Score
9/10

Malware Config

Signatures

  • Renames multiple (3442) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb30856e7473bfc9ed0aba76874146c8864be2547f9d5ae98b39ae0eefd6075e.exe
    "C:\Users\Admin\AppData\Local\Temp\eb30856e7473bfc9ed0aba76874146c8864be2547f9d5ae98b39ae0eefd6075e.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2888

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-481678230-3773327859-3495911762-1000\desktop.ini.tmp

    Filesize

    113KB

    MD5

    124d29261d8903ab275c16b03100f0db

    SHA1

    e50eca3ac4648d870c77107d2cebc6e358e60920

    SHA256

    7e19bebd6de7dbeecf628906e0455104f6c67eaa1b6bcc547e645f110cd359f2

    SHA512

    88202770425f55e6d3ea5062374e4befbae60384801d4632737fb9c0ce787412213458691aedfb1f6b38d6d9fde4eabd6a33bb2a2611fddab059abd6626036eb

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    122KB

    MD5

    9d14445bf7bacf553fe7e839f5c3c829

    SHA1

    7543bc34d35e2cf511460ed054669330df4e68a9

    SHA256

    9050c7cbdf90e122c42474d0c6bdbad477b96b835d78cd377487e87baef5f093

    SHA512

    6c16f06dfea385c7f2ddd92089d51d337da75768b2ccf4ac1ad2e6874fda104fe0bf92021f306e6939c0ff811f90cd5d4c431c57c89c2cf24ee47fd81f23661d

  • memory/2888-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2888-86-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB