Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11-06-2024 01:39

General

  • Target

    a92e75f4d614847e1d8957bcb1940e20e6f1b8d80c987a6216cc9126cdc86eee.exe

  • Size

    80KB

  • MD5

    7f5cbb22e110840f854e9c0971ac1d65

  • SHA1

    e761f30b25a336e40e7c79ef6d644c710dc66d83

  • SHA256

    a92e75f4d614847e1d8957bcb1940e20e6f1b8d80c987a6216cc9126cdc86eee

  • SHA512

    dc316e3d9842128821d1b515fe180e6953d623c4709c3fdf28568df1fcbbb311f4ba0261a472d39c00ec2ab11462406dc8573acf8a3bc7a2d680e99a89e68008

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8asUsTq5q9BVI2Il:fnyiQSohsUsWU9BK3l

Score
9/10

Malware Config

Signatures

  • Renames multiple (3534) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a92e75f4d614847e1d8957bcb1940e20e6f1b8d80c987a6216cc9126cdc86eee.exe
    "C:\Users\Admin\AppData\Local\Temp\a92e75f4d614847e1d8957bcb1940e20e6f1b8d80c987a6216cc9126cdc86eee.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1984

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2297530677-1229052932-2803917579-1000\desktop.ini.tmp

    Filesize

    81KB

    MD5

    78cfc89473df222e9f99e89262a38cfb

    SHA1

    91eaef750e48ea72d214896244993d13cdef4dcd

    SHA256

    17f2718016f4e90cdcd06b752fb4541c280789cb1f8074e8330069a53dfb73c1

    SHA512

    992d56646000e0583894555c079ff176684878621d9f71d762418eb837e4fc32a42391e0c776cf340e5e9b0b35fd61535990034b466138b5caf27f1be8cdec8f

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    89KB

    MD5

    f2b0eddd0cd10a3bb6d9a62eeb1711c6

    SHA1

    ad41dce423daf235ae41d76539d3701fbcc18289

    SHA256

    2c4006ea1c85bb1ba53ec06d7d962fc1afddebff56e8101f746ed38db5f7a863

    SHA512

    f664aa420b52489d36cf2b37ec8537356e851d170ba005cf786604c76725c012c9a3537f978b52d8a013366ecd6310cc7f0d7bb81ea38b7cd3ef790095e55fcc

  • memory/1984-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1984-650-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB