Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    12/06/2024, 05:10

General

  • Target

    dcd8ebed00b54d09fdce4a2d6c2a9f5d3bde6a3f1fa98e229cc519f1932ce110.exe

  • Size

    118KB

  • MD5

    93e828f97b63b00913a534ee8e59fb04

  • SHA1

    d643cc4724784660d3e8f1db84c380f53b016128

  • SHA256

    dcd8ebed00b54d09fdce4a2d6c2a9f5d3bde6a3f1fa98e229cc519f1932ce110

  • SHA512

    053c60eca9cbdd4c426419b0617a0cba32c8c3761719e323b7dc862abe059e7b8713899f141633803300455aa0820b84756bafcc154aaaab148f17b5a438a9ba

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfliY:hfAIuZAIuYSMjoqtMHfhflixit

Score
9/10

Malware Config

Signatures

  • Renames multiple (3456) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dcd8ebed00b54d09fdce4a2d6c2a9f5d3bde6a3f1fa98e229cc519f1932ce110.exe
    "C:\Users\Admin\AppData\Local\Temp\dcd8ebed00b54d09fdce4a2d6c2a9f5d3bde6a3f1fa98e229cc519f1932ce110.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2364

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2812790648-3157963462-487717889-1000\desktop.ini.tmp

          Filesize

          118KB

          MD5

          2a4b572f875e07fdd7c273d9ea81a8d9

          SHA1

          075f9a702e884bdf029e5da30350933fc662e712

          SHA256

          687cab8cc2bfcaaf78eea1c4657382dcd7c13d05be08232bdfd4c2ac4a90675c

          SHA512

          a824fe9c190cd2bba2859eb574330784f912f3a3973736542c77f5d6d8b623816177b954e6af23da13101b015998f09c4dc413eb408c3e6dd20ef8526b5391df

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          127KB

          MD5

          f2bdb3957d54a3a1ba7c5cd87a4c6ef3

          SHA1

          1802364d9d32204456e5414af1cde959628dac36

          SHA256

          9b75e3d7b91d6cc7697a74353e6fa3a7cbb511a109fb46264570685330e8418e

          SHA512

          025927c15fa8ca44c33432b7f96002417dfd548bd65d7bc0ea5448ed255510a68e2eda96f396308f6b5245f4c5fdebabf76220089e915994f3a860b38d4b8222

        • memory/2364-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2364-86-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB