Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    20/06/2024, 18:08

General

  • Target

    009554f1d6d3bb3451b33a4a0528f2462188b02055bc3bc6f96649e3a69ddd73.exe

  • Size

    118KB

  • MD5

    f20fa9bc53fd53311d7529829989d98d

  • SHA1

    d86ecaed0c5516479589ba82338ad27685a41456

  • SHA256

    009554f1d6d3bb3451b33a4a0528f2462188b02055bc3bc6f96649e3a69ddd73

  • SHA512

    2e8838630c4b578042cc55ec0934948b734e0f30328ead4571223789b7b46e4bfaa977204534b3cbc5c2bcc1651726d067974858a7a595ef3fc4a188e35b0aa3

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxSLKr0ARZF6NFVogjQlRv/NPxz:fnyiQSo5LzwUhQ7Xhxz

Score
9/10

Malware Config

Signatures

  • Renames multiple (3433) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\009554f1d6d3bb3451b33a4a0528f2462188b02055bc3bc6f96649e3a69ddd73.exe
    "C:\Users\Admin\AppData\Local\Temp\009554f1d6d3bb3451b33a4a0528f2462188b02055bc3bc6f96649e3a69ddd73.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2484

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2812790648-3157963462-487717889-1000\desktop.ini.tmp

    Filesize

    118KB

    MD5

    c8afc4fdee522f05cf8b7559e10d0772

    SHA1

    cf6c92355554d5d09c21ce22287655b266145417

    SHA256

    3899722220b2ae89fedcbd302f22eb9801f32ba7036ee1d58cfc22fb04a7258a

    SHA512

    0b25d75f6016b1df46e172899b05692aebb84cc495e2d98233bc3eaf536d9551ddfb8fb85067d9b58a24b99bfdb4ce2184ff2228e3dafecaf33b82173d18cfc3

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    127KB

    MD5

    28bb2025d32e62a0bee869a98e058449

    SHA1

    b015f1d7f8a16f1fa2d970513f5a45299c145a17

    SHA256

    cb0f0ebbd8c74dd506495f7934b226f395d8afcfc4620de49d63e0c4608aa695

    SHA512

    54117c7c26b260f2112ac10f415b82a510f114308787e30e2a707a9d3cb9a5bbee0ad370e2e3d3dffcb8f4e56011acd004f3e73ab45c2c6c77f696d5d68bcae9

  • memory/2484-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2484-608-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB