Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    05-07-2024 20:43

General

  • Target

    3c2a3fe4d43bc0f6ceb595a424baab4c41a9101a6833eb6dbdce87590cbfa285.exe

  • Size

    108KB

  • MD5

    9ab2e49691bbad8a6ffaee98ee4fb57d

  • SHA1

    2b6e60aaef809b2c9bbfa751b8ad5e00c7217e76

  • SHA256

    3c2a3fe4d43bc0f6ceb595a424baab4c41a9101a6833eb6dbdce87590cbfa285

  • SHA512

    ba58ea790e1593c4b7635aeab5e75552f4719bf05a30fa893642b651b45fd62d05372bc1acba1001d1ac2542c6d9ba75398cb8327759d4cc5c4273fb9d5df264

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8asUsxe+eX7n97nPll7n97n0G6UkL:fnyiQSohsUsxe+erZLZ0G67

Score
9/10

Malware Config

Signatures

  • Renames multiple (3438) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c2a3fe4d43bc0f6ceb595a424baab4c41a9101a6833eb6dbdce87590cbfa285.exe
    "C:\Users\Admin\AppData\Local\Temp\3c2a3fe4d43bc0f6ceb595a424baab4c41a9101a6833eb6dbdce87590cbfa285.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2084

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2660163958-4080398480-1122754539-1000\desktop.ini.tmp

    Filesize

    109KB

    MD5

    04a9f3db7652613919faf095883d6725

    SHA1

    7f4f05abdaaff6933bcd9818c3367448800b2941

    SHA256

    f78247a378983694b6bfe4ef9b4ecb42c00f5099fbf722f21e1602404c0cf411

    SHA512

    4de8e6c542199e58729a2e5984e2d5c4a796dfd443ab81b1f1a3d022f9b8c0b8c8a10b6b50b240e45f2da44e4ab0e0329afd00f459afee89619bdecc1b560698

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    117KB

    MD5

    3554c9e3492ab43888167136cb0516dc

    SHA1

    d9160138693b2fcf690f43ac2af4f30da7c62db5

    SHA256

    a9e65928cfd146032f6f15563ab0bd1e146fb024b2c8cdb1207c670bd32bd8b4

    SHA512

    3c02b253da08d4fe977bdda5a462126fb840d75c7ab11e5abc18d93b03568cde7cc9824486eca71b84d92b2aaf1735e5890c29a9c176f17af6df49cb9606e2d8

  • memory/2084-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2084-606-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB