Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05-07-2024 21:24

General

  • Target

    4ca7464f60a2053277733e6a0f5cf602fff7aae548d521131823812800a260ea.exe

  • Size

    58KB

  • MD5

    836b30dd79134b5316aeabefad04ff06

  • SHA1

    106f6bb91179ad56f3aca47b3dc33f623670e336

  • SHA256

    4ca7464f60a2053277733e6a0f5cf602fff7aae548d521131823812800a260ea

  • SHA512

    7136895063716564eb6cb2c81638c7e5ec8b1631fb16f2c6601e15d326e3dc66bcc95cfe499d2fbdd0b456f6ff839e1d12d7b6b35ffd2c0da5307c79a4ae0e46

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw/x/fxRfxCZj1hcaEWcxINgjn+4J:V7Zf/FAxTWOx/fxRfxCZj1hcaEWAIy+K

Score
9/10

Malware Config

Signatures

  • Renames multiple (3456) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ca7464f60a2053277733e6a0f5cf602fff7aae548d521131823812800a260ea.exe
    "C:\Users\Admin\AppData\Local\Temp\4ca7464f60a2053277733e6a0f5cf602fff7aae548d521131823812800a260ea.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2412

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2297530677-1229052932-2803917579-1000\desktop.ini.tmp

    Filesize

    58KB

    MD5

    ad1d26df051ed26884b8f38304ee7ed3

    SHA1

    ed650da56af13bc83b9dbe083c217ae859ffd8cb

    SHA256

    5f56b022c4f310ded5338663031cb1b187c7e3376ff0d2bcb858a907ced095bf

    SHA512

    a15b64f70635f82ec9422241e932f7a220e116da3a2165fa8214e762a022b3bb8c47b32c2a528b50bee345d14ae03d5a4704048aa20f6e55aa74a25587120ee9

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    67KB

    MD5

    9d7ab337165a640101069c22836c43aa

    SHA1

    da95a2a2b0f41c0a95e3f4938d5ff6d4d756d22f

    SHA256

    ff0b654e8e419bbb616b70914e325d6fbbf714535d34b889f48dfcd99ec56848

    SHA512

    1020a3437b4b1ee9c8016c4d7fb651cd52e41124b69137095c49bf70727d9d122e3631230670778d9ae3eefae5edaaf63e7c78f37c9d26fa46d5f62a5f7951a0

  • memory/2412-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2412-440-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB