Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    01/07/2024, 18:20

General

  • Target

    04c65a5b5829f8adcc1c7183e44991d2a5a40c894d408022b606e20b19813ba6.exe

  • Size

    2.7MB

  • MD5

    1d13019116a874f521ffedcb96e8ffad

  • SHA1

    6045975f9ca8dfb17752cad12dcc28e69272e597

  • SHA256

    04c65a5b5829f8adcc1c7183e44991d2a5a40c894d408022b606e20b19813ba6

  • SHA512

    29e04c201fbc61e818c45092e2b9d970a32e4850b8669e14f5c423142b79cb5710efd4dc0eb137e6dddce4790afa035f3d08e74b6ab40b0dd4f5ee943fdd1be8

  • SSDEEP

    49152:VefR6OWEYqc+A7muks/AouA7CP57A7mC33:kfR6OWEg+A7muknoNChA7mCH

Score
9/10

Malware Config

Signatures

  • Renames multiple (230) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04c65a5b5829f8adcc1c7183e44991d2a5a40c894d408022b606e20b19813ba6.exe
    "C:\Users\Admin\AppData\Local\Temp\04c65a5b5829f8adcc1c7183e44991d2a5a40c894d408022b606e20b19813ba6.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2932

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-481678230-3773327859-3495911762-1000\desktop.ini.tmp

          Filesize

          2.7MB

          MD5

          0877a89141dde3a49d5b3b714f334ac1

          SHA1

          919e8d2cdcaf2a044bb02b51530a4fccc1c62d3c

          SHA256

          8ec380601b4ef409c7af318d0aa250a00783419f5d530343a54216a43127bbba

          SHA512

          a3353ed93e66929321f9fd7dd8d517d116bdf168f3f635cd2b431c81d1b0c4ce7a6d2e8d739c0f0ba6c2eea7a0f8bb896e87c1f5be7f1acb4f8a7ce5c1386b6c

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          2.7MB

          MD5

          2b552e55378981a82d0d2a010dc5819e

          SHA1

          d09e43df665a2d09babe70175cd026cea8f0dae9

          SHA256

          1d8a05dd2194360671d94043529d886a996e90b7efab1dcf6ec710c8097f0159

          SHA512

          c7e688bbc72056fe9f12e57c0405cbaceb485957be6b8a3439e4372efd05ef6515f3d7f7d89ec45d79001096de83d82020cd9b4ebda82032268ee93298f27ac5

        • memory/2932-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2932-120-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB