Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    06/07/2024, 00:50

General

  • Target

    2364889e0e5e989a6660c194a8286840.exe

  • Size

    52KB

  • MD5

    2364889e0e5e989a6660c194a8286840

  • SHA1

    087555d973bc16e0ccb1bd296e5bf24992d44025

  • SHA256

    489173ecd72c1b744e6398e4d25f601b37d01ca0275a2d024c923b9ce533d026

  • SHA512

    907d30178c2e2b42deba7c895bd5c3110df5766bb5b0f2e16a596bc98b1c9f747869be7b01dc5f276415fec5013c1fc311a85546ae3e7759c2a1a4f1751160f5

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJjtf8WUtf8WZCqCBUpCUpU:V7Zf/FAxTWoJJ2WjWZCqCBUpCUpU

Score
9/10

Malware Config

Signatures

  • Renames multiple (3444) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2364889e0e5e989a6660c194a8286840.exe
    "C:\Users\Admin\AppData\Local\Temp\2364889e0e5e989a6660c194a8286840.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2724

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

          Filesize

          52KB

          MD5

          4cac539441b0fa865c4ffee1219144cc

          SHA1

          52dc09113986cd7fffc969810b31973fc8efbb90

          SHA256

          67b2bfd51e41288aac649e8943c67f3991bc36a8e6428d81b56d208782a42f0d

          SHA512

          c087669adb1c6799ea457faf7fe409875924518400ce365718d306347776039297938688a0c7d409d8c0b5ea0a932423528e0e96f67c657d3b44e752faad721c

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          61KB

          MD5

          281da683a72b149bf95636dbbe6476d4

          SHA1

          e860743fdeebbc0537b975728397d8b50941d328

          SHA256

          deccc9a037c4b95253456994d20f12e2af1328577d8b5a71c4b3596edf300a42

          SHA512

          79d43c1d8d2c53c30e27d0b7d7daa5b345df02e6fb0cddee21ad63cf1832e16024d2674215053dc20cb4be2827724fc68eb2e5267220e6ba5bd69cef5a3568ba

        • memory/2724-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2724-384-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB