Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/06/2024, 04:51

General

  • Target

    fb1a7f96e5c3e691b211b4f1d87ee47a23cd29349d0aa4752839190ab3eefc53.exe

  • Size

    46KB

  • MD5

    7445b662b27b48240f452b24f42f2ef9

  • SHA1

    c6fd8cafb3c32fa2ed00be9b7fcc83999efbe920

  • SHA256

    fb1a7f96e5c3e691b211b4f1d87ee47a23cd29349d0aa4752839190ab3eefc53

  • SHA512

    2087695ac28153eabf97a259f822e66d21cdff89bc8379bf7f71be1e5d69e80e33b5e303a55b49fd25ebfe4d5b54caa5824b7788ae82ffd3dd9765260b67d0b2

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFzT:CTWn1++PJHJXA/OsIZfzc3/Q8zxJ

Score
9/10

Malware Config

Signatures

  • Renames multiple (3729) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb1a7f96e5c3e691b211b4f1d87ee47a23cd29349d0aa4752839190ab3eefc53.exe
    "C:\Users\Admin\AppData\Local\Temp\fb1a7f96e5c3e691b211b4f1d87ee47a23cd29349d0aa4752839190ab3eefc53.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2172

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1298544033-3225604241-2703760938-1000\desktop.ini.tmp

    Filesize

    46KB

    MD5

    94b4eff8c1d94f06605d073bdcca5dc6

    SHA1

    74da8fa48841039ba8002d95531a2ac1680ddce0

    SHA256

    dc6bd67278dbc4151d7cc6be9a76af64f0d474702c8449c00285556fa97cb2ed

    SHA512

    6c47bab6d54697accc1ff6158ede19f99034b0de61ec6fd69b24f218c08566ddcc0d224217b6d61afc885ab630ee82b378cf95f70fcc3e88dd7afdfe98b3c7db

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    55KB

    MD5

    9eda47fa68332b48f998188b7f50d79f

    SHA1

    94d6db06f99e119188d8e8810b0b6dd8d88ea06f

    SHA256

    03af795bc071b3d8c5635b74d7fd7f27d65a9af4c76fe3a41567eff46df51f97

    SHA512

    9f662f5175264bfee6ebac0d5d43bc2ed035d651a75f1d80b982f262b77bad4a9df041cdaf736458b47ea89cc2452f8371e41e1a2dd701d4a3076198c4163818

  • memory/2172-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2172-82-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB