Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07/07/2024, 02:27

General

  • Target

    b4d14721631e803ab76dc0bf52b289bee830063fe8868712ee4f4ee8289f4c60.exe

  • Size

    40KB

  • MD5

    bbfb3e137fd0d84ce32c661d0186cbc6

  • SHA1

    687cc0e66e5b16d57d031c3e596f21dff77c41da

  • SHA256

    b4d14721631e803ab76dc0bf52b289bee830063fe8868712ee4f4ee8289f4c60

  • SHA512

    4a46c51ccd80cf340c7a653e9bb49f7fa76713e66d4c0cb69fcc6976d779edcaccfe432ccc32227c5d85d5947ff2f7363a705a62ee8334c157ea94e2888318bb

  • SSDEEP

    768:a7BlpyqaFAK65euBT37CPKKDm7EJJBZBZaOAOIBRBT37Y:a7ZyqaFAxTWbJJB7LDKTk

Score
9/10

Malware Config

Signatures

  • Renames multiple (2842) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b4d14721631e803ab76dc0bf52b289bee830063fe8868712ee4f4ee8289f4c60.exe
    "C:\Users\Admin\AppData\Local\Temp\b4d14721631e803ab76dc0bf52b289bee830063fe8868712ee4f4ee8289f4c60.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2452

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2297530677-1229052932-2803917579-1000\desktop.ini.tmp

          Filesize

          40KB

          MD5

          dffa1b491b7e516463248f679d8da040

          SHA1

          1d6144368526718249dcb4cc59b250077bd49709

          SHA256

          46733ccd8018048c339bdc70ebe64d39a277ebc74337f19900c9f682ef2fe835

          SHA512

          e19f55c41625973fc2ff475ac545c25bbe42bec0a9e9c6d9bb8417f29d3c0e21c9648a3d5aeacfd58fe471794d313ecafffbfae4ebb1e2698e7e94a473d9bb19

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          49KB

          MD5

          d11447432978139703700b59d94d8e59

          SHA1

          cd67ff5ff50777b7a795c6f5f47827402ee393d9

          SHA256

          ba70404eb8bb0b490f5352e3d36a27d30d42525f8c046486ce9f1384fb229076

          SHA512

          73a1c892b28fff48f961cd717cea3ada806aa8d54da730a02d92fae456984f04a1cdc43fb2f95b2302240b775f87f9361d11106958f3c880293c79f5d6b3d97d

        • memory/2452-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2452-104-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB