Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    03/07/2024, 03:40

General

  • Target

    351903b6eb9c8b1213e368f133ab2c0e5065f7ef666a6ef6a2134b9bae5aded5.exe

  • Size

    107KB

  • MD5

    d8baf85b4ca562fa0734b5050a0801c0

  • SHA1

    34e8d6d3f8e6450411a1dc943df0b30f508123a9

  • SHA256

    351903b6eb9c8b1213e368f133ab2c0e5065f7ef666a6ef6a2134b9bae5aded5

  • SHA512

    c069fb03cfd3f75634c8459aa0e672b42e494543be7a416a25aab16e42be1d4ad6d13537fda5914561de04d65043d4fde3a12f40c6b2c74b4f9f8f3ad93b649b

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8IZuEd4HZKMSs9w7WsLhEC7pGmRUf:KQSo7Z54HZKMx4dhECVGmW

Score
9/10

Malware Config

Signatures

  • Renames multiple (3455) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\351903b6eb9c8b1213e368f133ab2c0e5065f7ef666a6ef6a2134b9bae5aded5.exe
    "C:\Users\Admin\AppData\Local\Temp\351903b6eb9c8b1213e368f133ab2c0e5065f7ef666a6ef6a2134b9bae5aded5.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2428

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2812790648-3157963462-487717889-1000\desktop.ini.tmp

          Filesize

          107KB

          MD5

          d49891e86d1edd2356cb02fe3402d053

          SHA1

          c40f76847092816f17d6ca715b84c6f692fd0528

          SHA256

          252133f34c496dd9c420f1b8c6deeaa9462b1bc0fba219b554e83a8655f2ad03

          SHA512

          66d0683126e7698412f66a391f1bdc6b57c4a00a79db4cc739151086ec0feed94cd3cd464a2898915d8afc6bc58ec6adb36c2903b58907993e1870767b3324d2

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          116KB

          MD5

          8fdabd32a6b0cb28f63c0671bee0d714

          SHA1

          676be4ba4da9ccc1fe9994933e0b747a36abcbae

          SHA256

          67b0d0a8c1c9719301fc7bf6286fe7a8c04734f784413632e829f9fe8969430a

          SHA512

          2f4be4a45f9cb0faaf089b45162b607aa82e8a6de3b373c710655fceff9a8663571192472dfdb6d57a826771479beffae27b5ed4a7e65cfe20ac6ed0f667d06e

        • memory/2428-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2428-76-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB