Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 05:04

General

  • Target

    df3d847f2b99fada3449bf906b10038211fb5169303885d9d69d35ba946ee69b.exe

  • Size

    68KB

  • MD5

    4e16c136fa332f42a6dbfd93bb1cd1fd

  • SHA1

    c0c89c8e7a0c1ebd1614b429aec781811de37497

  • SHA256

    df3d847f2b99fada3449bf906b10038211fb5169303885d9d69d35ba946ee69b

  • SHA512

    a3df46335fe100f5c24b864ca5fffccd07fe7d321a3fbdd764f069e671a1cd1690c3ec5af916b39f576aa8a29b61753b624be372a8ce11cc8a023de476282bf8

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8B8/8ugO:+nyiQSoFkugO

Score
9/10

Malware Config

Signatures

  • Renames multiple (3503) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df3d847f2b99fada3449bf906b10038211fb5169303885d9d69d35ba946ee69b.exe
    "C:\Users\Admin\AppData\Local\Temp\df3d847f2b99fada3449bf906b10038211fb5169303885d9d69d35ba946ee69b.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2300

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1340930862-1405011213-2821322012-1000\desktop.ini.tmp
    Filesize

    68KB

    MD5

    3ae2750eebeadad1e598cbb8693e6046

    SHA1

    3e44d13c51e53741c4f853042fbfb0412c7244da

    SHA256

    6a78fbc9a2fafcfff2c0f2349fe12af5f871d91d489e8a2e283f84846e28d0d1

    SHA512

    d367c0b395f7adf3b333a22e967e1fe07b9c9c64f742aeaefa96b9ac6d810ee3162bdb2d43b20931cbc9b05848d6c8b480d44996fa50a331822b0792c42bc9b7

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    77KB

    MD5

    43b83c0fc51b1930418cca3b433360cc

    SHA1

    772a42b558687fae79d562cdba35f34f600f77c0

    SHA256

    76cec9f8e7b25d917874217616e81ba9ac077e7b41a00232f1c776351e4add6e

    SHA512

    b358fb67dd584d9c57eac3d897cd7552a6245b720fcf9ee95dc52ed7fbef403335ecbcfdc7ce09de484beaac8017c8fc6a5f37867db5cc7575feb7bea6e0257b

  • memory/2300-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2300-650-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB