Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-06-2024 18:21

General

  • Target

    05ec37c631bb6fa3000aa5164672a3c627f3ea7dcbc6f3d720f0402111e5676d.exe

  • Size

    77KB

  • MD5

    d8eaf8216c42b4817d9f2172ffb219db

  • SHA1

    ef08acb94ed654265a43e470b91ad69781c5504a

  • SHA256

    05ec37c631bb6fa3000aa5164672a3c627f3ea7dcbc6f3d720f0402111e5676d

  • SHA512

    52c50517dc8aa60d315a5b898ae510583fda34a9deeb2eac624ec53076d3b3fa97b9e5808b1707e1a4d8118864563c6ae1e036776638a6e036c9c0328c4d42af

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8/kJOM2kJOMQv:fnyiQSo0dB

Score
9/10

Malware Config

Signatures

  • Renames multiple (4723) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05ec37c631bb6fa3000aa5164672a3c627f3ea7dcbc6f3d720f0402111e5676d.exe
    "C:\Users\Admin\AppData\Local\Temp\05ec37c631bb6fa3000aa5164672a3c627f3ea7dcbc6f3d720f0402111e5676d.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4884

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3169499791-3545231813-3156325206-1000\desktop.ini.tmp

    Filesize

    77KB

    MD5

    4d83346e2d9791e2186289e58b659ff9

    SHA1

    d43d87d2c4a705b5d4486ae589c5e42e06b4442c

    SHA256

    3cb7c040f329990b3a1da2ff42a1ae6cbcaa7d9f3f1eb809531a221c63d2e375

    SHA512

    0360c12bcf0e7a009f6c0ae90786125a89790efb171d98aea2e2385e835619fe722ea9415a6236bd74236db55aa902858f374bed53dca5547d3bfdf2ff24d94a

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    176KB

    MD5

    07c38809aa7f5048d2af8aaa311b9428

    SHA1

    aaed0b8bb9701355b1161dc8966425ee0b11d70d

    SHA256

    ca1318d9a1becdd578c2f284c5e248e13d7b929b773996950974fc95772596ca

    SHA512

    f874c0c496d4b4c791d4ff31500a0aac4cafafad45b1dab8a79fd17fad8ca8d654aee302a3bffa2fd789e295c4e5475d00c35c1efb4c920d8434f2cafa6a5496

  • memory/4884-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4884-1734-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB