Analysis

  • max time kernel
    147s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    01/07/2024, 00:11

General

  • Target

    90069de9e81184adb2355047d65a4096a9afbf38cb53e879493bce0cb120ad31.exe

  • Size

    88KB

  • MD5

    8c1e29f801729133afb103743144abfb

  • SHA1

    f5165bad251e1fa2e0247d4d3f8a05ff65e798db

  • SHA256

    90069de9e81184adb2355047d65a4096a9afbf38cb53e879493bce0cb120ad31

  • SHA512

    3a23e98805b57719acdd91995a9f774af9fdb7cf647081cb17e634b259811764021994b5ee1c373769d0c6f151c87176ed97f1eb5700501085bf992459637c28

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zx6l:fnyiQSoFl

Score
9/10

Malware Config

Signatures

  • Renames multiple (552) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\90069de9e81184adb2355047d65a4096a9afbf38cb53e879493bce0cb120ad31.exe
    "C:\Users\Admin\AppData\Local\Temp\90069de9e81184adb2355047d65a4096a9afbf38cb53e879493bce0cb120ad31.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1932

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-39690363-730359138-1046745555-1000\desktop.ini.tmp

    Filesize

    88KB

    MD5

    308861effa6f9d3713fbd4b1b3e8efde

    SHA1

    a00048a4b79574a544256b7c2d8273d05a26147c

    SHA256

    df0fe10e6ca250e4ee7b28146b16cc95e57e5663a393f6e3831a7e8c6ab4bce3

    SHA512

    192e560614511b6e68f12331e64d5a81ad9f78e081866602bd2f02df42d50ac033ac29d8f0b7454d85912becc5e3f677da21770f118b7162d2f1b9b43ac810dc

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    97KB

    MD5

    d29ef27b212561caf61a3d559f857c91

    SHA1

    0ec8b05562c306e009f2556121611e78173efa16

    SHA256

    1e5e41b582deba55d398ea2b85d4d96de4f98d9d8d1193bd4053e69892480397

    SHA512

    d5b6d04b02ed9495478c30d6642c1f3f5d3aeebae0d7be58b7c9330b7f543984e5af7f17d8bb80cddc587e400ec6a93d964d2b93dc013c7ede4d69ffd27a2baf

  • memory/1932-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1932-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB