Analysis

  • max time kernel
    149s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    07/07/2024, 02:35

General

  • Target

    b7dd43ade8cd46e7a67d4bfb94ece400f5b812f6da9ec80ad307eeee0c741458.exe

  • Size

    59KB

  • MD5

    ddf97953ef90ca9270eb8f0ac4a88e68

  • SHA1

    27dc9ca712790681f61f17db6e9b412cde8d0636

  • SHA256

    b7dd43ade8cd46e7a67d4bfb94ece400f5b812f6da9ec80ad307eeee0c741458

  • SHA512

    77f6d4482bdb967662ab7009610780e35a715d5c15baf5d1091ec6726d5e8817ae0abec3a3e5cf25bf0db22ed69571de71295bc8f71288ada2c30356b6697507

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rG:V7Zf/FAxTWxOmO/fxRfx/

Score
9/10

Malware Config

Signatures

  • Renames multiple (478) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7dd43ade8cd46e7a67d4bfb94ece400f5b812f6da9ec80ad307eeee0c741458.exe
    "C:\Users\Admin\AppData\Local\Temp\b7dd43ade8cd46e7a67d4bfb94ece400f5b812f6da9ec80ad307eeee0c741458.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2816

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

    Filesize

    59KB

    MD5

    3ab3fd8257b1b6c6c449021756bc3303

    SHA1

    d9278377019c79896a4d1f50305f99ef4eb6300e

    SHA256

    1178a201e727149c12bd1529f86d35370bce60e8644810a2a6728091e16bf221

    SHA512

    a543664611745eb6abf26ab908c8ca859ca744cadbb34ac47dd6d725648a6ca0b0f3dcb421f52e5286268764a7cba7de24cb74d67a3b4d3e803ee3841fad27b5

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    68KB

    MD5

    1d267d554625c298c52a7e2b6baab447

    SHA1

    77c280a97af2f0e9588eae1bb3b15861c7ab34fc

    SHA256

    7193642f9f10495648cd0754b2e4794ebc22f692cefe5cdfa415d717ca1671c3

    SHA512

    6dd36123e71d50da81c9bb10fbee04538555d5883f5ffe7f8e81d0f3f5144f011a1d8da84e8567eae8c8f72154fdcf7ccffe7c1178e40af3cdebdb5200824edc

  • memory/2816-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2816-50-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB