Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/07/2024, 04:04

General

  • Target

    3dab9cdea16a2d445e7fea82ef22aab0N.exe

  • Size

    53KB

  • MD5

    3dab9cdea16a2d445e7fea82ef22aab0

  • SHA1

    ff7f684151d20a39b6a88dbde4594c43b0f4eaf3

  • SHA256

    8146f86fb87f856b20aef4937b2a707761a1332afeba90685f0639a421e28469

  • SHA512

    d71520a0ecfa8726c27c2e1c2c65fe6cf7f8dd6e53f568906827b354341b14fb8432a00fc36043b5fe68c50afae9961ad88ea4248f1542e15aaf7fca3ec803a1

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJjtf8WUtf8WZCqCL:V7Zf/FAxTWoJJ2WjWZCqCL

Score
9/10

Malware Config

Signatures

  • Renames multiple (5189) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3dab9cdea16a2d445e7fea82ef22aab0N.exe
    "C:\Users\Admin\AppData\Local\Temp\3dab9cdea16a2d445e7fea82ef22aab0N.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4060

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3642458265-1901903390-453309326-1000\desktop.ini.tmp

          Filesize

          53KB

          MD5

          42fca2065e17486d4cadc65a0752e40d

          SHA1

          06fd15cce02623052172cd6bf99a21ae1f8b4a4f

          SHA256

          04e45cefc00aadf6c580c62db5d70e5f7fce51d714b6ffca0c4e8dc3c34070f2

          SHA512

          7a14df71319342e877c8e8ec84196d3a61c26c1a5caaee3f01aacadce52235cf4eceb9ee240d902a4baadf6cc05a66397b33ada13af56b28d37bf4f30be19b5f

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          152KB

          MD5

          e3978a3eb0c7cf61f1adb20caa6c15af

          SHA1

          c3bf173bfc8dc705c039e8dd8c04e5ffae468dea

          SHA256

          53cae58861cb07faeed41244d5ac8501bb458dc498cd91d558c80f33201be991

          SHA512

          982d3b70f285574c7e1d00df2516c6628e20a0e0cb1c8f74a8f4892f3a2cd9278901223a00e7c1c8298938af5114e77705f5baa381d1e83c89e4af871cb13d3c

        • memory/4060-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/4060-1864-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB