Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 00:12

General

  • Target

    7515ad4c424843b37987138e66ac9eaef94197aaab289daf111c1c61ddc5d881.exe

  • Size

    137KB

  • MD5

    239e3d94003a81408cc7a9b682439604

  • SHA1

    232b68f12ad0482350d1b9e08f613e22568e1f5c

  • SHA256

    7515ad4c424843b37987138e66ac9eaef94197aaab289daf111c1c61ddc5d881

  • SHA512

    964ecf78a76525ea5ebbbe8039d286d6d8215783aa298d6e16732ecd3c7432a4ddd43c2da26345c134245537f0bf1cfc9144ead6b7e10ed1c01bbe996f7faae6

  • SSDEEP

    1536:a7ZyqaFAlsr1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSM:enaym3AIuZAIuYSMjoqtMHfhfK

Score
9/10

Malware Config

Signatures

  • Renames multiple (3436) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7515ad4c424843b37987138e66ac9eaef94197aaab289daf111c1c61ddc5d881.exe
    "C:\Users\Admin\AppData\Local\Temp\7515ad4c424843b37987138e66ac9eaef94197aaab289daf111c1c61ddc5d881.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2972

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2297530677-1229052932-2803917579-1000\desktop.ini.tmp
    Filesize

    138KB

    MD5

    12a7448fafee27fa73474df56ba4a4b9

    SHA1

    af45389160a07c19b59691319bb372eaa2ef52e2

    SHA256

    64ffc38e4355ef2babf799a1e3b015a5e60fe658dd062ccce217a217586cc8a6

    SHA512

    0b17d82af7645cc01d5ef95c256e329eff1d6b7f8e7453ce2c81f3aa36db1e1ccd529c34d67fafc6ba0b40ed8b1e57039459a15c5497de44f83f1fdded2a7fa4

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    147KB

    MD5

    53a64f0445d4a581135795594fd08494

    SHA1

    3c5802ecc3bf6aa38c765557f1946b7ffee48cff

    SHA256

    5b2b394013b71cff1ce9af5785e006662ae738f9b0df1fda8a13c250201cd9e2

    SHA512

    2bb9af3e7c8832d52624268defdd2d343604d647a42126fdabb32bf468c285f1d0e3762c6f0f79d576363a7d714aeff3de6cdc0cfc6150307e9422dfc5c681f4

  • memory/2972-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2972-644-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB