Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 04:35

General

  • Target

    d6302063677dfdd6776a14602e0ef62bf1d600e73a982c531f80f2ca5aa519e7.exe

  • Size

    204KB

  • MD5

    97a7a598546108d653bb5e5352a3893f

  • SHA1

    3817856d8cad100c8b013456c41279ee1461f78d

  • SHA256

    d6302063677dfdd6776a14602e0ef62bf1d600e73a982c531f80f2ca5aa519e7

  • SHA512

    7bdd943718d1e758ec90f53d33ebf7e1a1e5293a53845e806bd3ac1b0d5e142a142c50804dfc9df1c63b32788b49d942211c046ef285428927594470e1f87f10

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8yiXyA:fnyiQSoIyA

Score
9/10

Malware Config

Signatures

  • Renames multiple (3141) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d6302063677dfdd6776a14602e0ef62bf1d600e73a982c531f80f2ca5aa519e7.exe
    "C:\Users\Admin\AppData\Local\Temp\d6302063677dfdd6776a14602e0ef62bf1d600e73a982c531f80f2ca5aa519e7.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2360

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini.tmp
    Filesize

    205KB

    MD5

    bd38146cf1b969c93e80e424d7fbe12b

    SHA1

    d179c1d15cdbc0e75cc74c5bcdc8a29f5b983dba

    SHA256

    7924142599a02959ec2323e72b31601fbe6d2fe9a048563559bf8df867775aa1

    SHA512

    0b7992c562d3247ff1b38c7ec0b9317800737b3643363a1d3e4808f1e7ebb3c353ad5e9d63ad8921a00d6d8f8a1c37a70903a7de49a026780621e77463cc704b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    213KB

    MD5

    327264fdc7241f5f16449f5bc2ec6442

    SHA1

    4968552dfeabc1a0d8f6c3bdaa9290bdceb2c9bc

    SHA256

    ea5df91b355360c2483c92b74fc6bbda76f763f8ee054aa2177af2ba424f3e27

    SHA512

    2dc7b69f30d2621a880872693b2fbf95a6e7c6eed0942c29a3c5a966ef4dca0a93ca6f55929b79bab5d8bff46fdfa697b25c038da5b2c0ebe3de85a8f0a5c7b0

  • memory/2360-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2360-464-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB