Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    19/06/2024, 23:57

General

  • Target

    83736a7d8bec4c0a54db0a31fa71a6d0b9fb7a716598bdb8c89ccceaa4edd9ec.exe

  • Size

    61KB

  • MD5

    64ab5d5b112a5612189e583f3fb4d30e

  • SHA1

    e1c62360a7eb5ec305ef36d54028016da15f7b24

  • SHA256

    83736a7d8bec4c0a54db0a31fa71a6d0b9fb7a716598bdb8c89ccceaa4edd9ec

  • SHA512

    0b9090de33bbc49e9e5f8887acdc40b79697d41173f2f6c0454861fb8607058fdca237fc11e8ede0709508c5438388986870e8490f8d1720e21a34b54be84f05

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8asUsxe+eX7n97nwvxx:KQSohsUsxe+erZU

Score
9/10

Malware Config

Signatures

  • Renames multiple (3697) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\83736a7d8bec4c0a54db0a31fa71a6d0b9fb7a716598bdb8c89ccceaa4edd9ec.exe
    "C:\Users\Admin\AppData\Local\Temp\83736a7d8bec4c0a54db0a31fa71a6d0b9fb7a716598bdb8c89ccceaa4edd9ec.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1684

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2721934792-624042501-2768869379-1000\desktop.ini.tmp

    Filesize

    61KB

    MD5

    7a89d5c0d882cdf5b4d3ca407afff00f

    SHA1

    d777e2f4ced148a824a805dd5b8866bd7db95ae8

    SHA256

    41d3f28503a75b666de6bde3402780b9117261e5f2a257b5453cb5c318896bbf

    SHA512

    edfd38b6938889b02f35ffefca99d810a2804fbfd963ec8cd5df5f7bf3855fec34a9cefd41168cb8ace66ecb54c104205f2c5df7212f60ceff42967443f93291

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    70KB

    MD5

    2818cc40a3b26d480650f76d7314bcef

    SHA1

    fe5ca5314e4f7a6b33cbcdf817571aa862a44f39

    SHA256

    d3eb70eb9a8b1a15cf4c9e0c54a0eb65e729301b49667c38f63e2d9b12166de3

    SHA512

    928a159469815c4a0596e83f96126d81a0394efb3746c84a778aaef3cf8f031e299b6d3e4ca16b56bb1da49704f633f40248cd57c7850b0f44775faf6cb52148

  • memory/1684-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1684-78-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB