Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    04/07/2024, 21:59

General

  • Target

    5a0dd3bea3e41141b982dafe07c5f8804aaafa96f4c6581eda57c69fb016f642.exe

  • Size

    51KB

  • MD5

    b007b8656a5a2e63b7c1aaabed709d07

  • SHA1

    8bb6ac1787573263d36b8f399687e98a25201a74

  • SHA256

    5a0dd3bea3e41141b982dafe07c5f8804aaafa96f4c6581eda57c69fb016f642

  • SHA512

    7de3d913c36197c507e4f1fb6452c6d6177c2a73d25e38b7fab6388372aa78c433332e7f0977b99497d2461eb341e2288f08a2476d4945aa26ac89549e75aced

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFzM:CTWn1++PJHJXA/OsIZfzc3/Q8zxy

Score
9/10

Malware Config

Signatures

  • Renames multiple (3698) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a0dd3bea3e41141b982dafe07c5f8804aaafa96f4c6581eda57c69fb016f642.exe
    "C:\Users\Admin\AppData\Local\Temp\5a0dd3bea3e41141b982dafe07c5f8804aaafa96f4c6581eda57c69fb016f642.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1224

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3691908287-3775019229-3534252667-1000\desktop.ini.tmp

          Filesize

          51KB

          MD5

          c35d72221a2c3e98cb1a3d090de20b07

          SHA1

          3fde8397005ccaaad4a3b965343f7048d746f1ce

          SHA256

          524bb81586cb60baa1aa32db2c7b646a08ff5c0275e0246e5af6978d645ba33d

          SHA512

          fb614be8e896ebb267d2c79fbacbbc2721dc622ca55778c712bfa7f10600fa344aa1495500ff277b13e2bf5ff442641e6accfacd7b1a895ff10edf9a716fdfad

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          60KB

          MD5

          87c52cc1bd8c0032ad32cc2aa6d7cca6

          SHA1

          cd614fe99dc8121dc57b6bc8a4625410b17e168a

          SHA256

          ad579a092abd229fae2df91e2b32ff13efcdd02de3e23aec33ae5985121add9d

          SHA512

          6f95aa2d87744dc9c42c793aa9a467d2c4d26d09d7f511e264a8933dda7b6e387d5baafed9c108069ea7d7b44da649facb31bc51304726bb54844162f69a3e45

        • memory/1224-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/1224-86-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB