Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    04/07/2024, 19:45

General

  • Target

    22ca3fd7b3410e88ad635186796e17625969c7a089e7f975fc47a5756ab0d455.exe

  • Size

    44KB

  • MD5

    4e93fad0df6037754562898ef9cc4e23

  • SHA1

    f116eba19bc3f5919c4eece887d62b1f2241fb76

  • SHA256

    22ca3fd7b3410e88ad635186796e17625969c7a089e7f975fc47a5756ab0d455

  • SHA512

    5236a4ec71bde2ff9eb5d8b85fc798bcc0cf283b20722abd69ccac41ed87171f9e34b08dc4c03d79a77b4f8092c0e381c4d343a64109803933e2e62a7ebef806

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI5E:V7Zf/FAxTWoJJ7TQ

Score
9/10

Malware Config

Signatures

  • Renames multiple (3791) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\22ca3fd7b3410e88ad635186796e17625969c7a089e7f975fc47a5756ab0d455.exe
    "C:\Users\Admin\AppData\Local\Temp\22ca3fd7b3410e88ad635186796e17625969c7a089e7f975fc47a5756ab0d455.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2116

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2737914667-933161113-3798636211-1000\desktop.ini.tmp

    Filesize

    44KB

    MD5

    d4eed2b5a0a8450d079b9b8f681d8be5

    SHA1

    eb3adbc486eb9634e01eae122d8d27d7abcb88c6

    SHA256

    38289bde9333a2ae91beef744547b02d1d91211fba05595d1ee49391508f415b

    SHA512

    5cd78c0240e23c6a3d5c42f0537211f7e40d0296d6261c8416ff8529c4587d4a3f6838368468f050d46653df1557350e1b059b31093420e55d0b10de14a11f39

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    53KB

    MD5

    5f8ed0a6ca71d9a43cd9d5ddc84a206b

    SHA1

    e1d0a397cdf59dd236013964cc5c190f72c029e1

    SHA256

    bff7388417ad944a0f82008fd80988a49fdea90111ee96c1d3142912a8a11440

    SHA512

    3e6255a03af01e2c114f44486636d20a6bf4813de5ba17a19b5fe9c2808ecf75866dc64f2b952239c052e4e98d48c665cc8c0af0d2fc610a71134929d00b506a

  • memory/2116-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2116-668-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB