Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    09-07-2024 05:41

General

  • Target

    d4ea0bc1ed5ff8876fe20f4860239b87e378def0d271521e125b181cc3b93042.exe

  • Size

    149KB

  • MD5

    705e8a77eec84c4894cb843b16f0c88d

  • SHA1

    fb35476dca009ac333bb9ec80550981e189a1beb

  • SHA256

    d4ea0bc1ed5ff8876fe20f4860239b87e378def0d271521e125b181cc3b93042

  • SHA512

    25b4d0466987d175c3c314739c20ea8d083f1a005f448b7fb63521e7b14a7015835b47052a4e12428a05ed38be3c5ce3676c4301efa8e7e86e250d10e2bf19ab

  • SSDEEP

    1536:a7ZyqaFAxTWH1++PJHJXA/OsIZfzc3/Q8WSjaYavUgJt8ynjorj9SvzpNzCbq9ab:enaypQSoNPvUgHz7zi

Score
9/10

Malware Config

Signatures

  • Renames multiple (3461) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4ea0bc1ed5ff8876fe20f4860239b87e378def0d271521e125b181cc3b93042.exe
    "C:\Users\Admin\AppData\Local\Temp\d4ea0bc1ed5ff8876fe20f4860239b87e378def0d271521e125b181cc3b93042.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1480

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2660163958-4080398480-1122754539-1000\desktop.ini.tmp

    Filesize

    150KB

    MD5

    b6438a6783a02489e27ca61a3a8f5e8e

    SHA1

    a737dcda555ef14033f57f9f456a509ae0c8fc52

    SHA256

    5be3e9379a1d6918501cae1c38d5ba2ae42c6339bd5cec44f6ebe5fccbdf7ac7

    SHA512

    ac02028f0e87f50e8ea85cf1f048537f6c8ea2e4ed1b2fc814dd46615223fe2b453801817453e795bb3a06b293009303e08cdc430209cd1b15e533c286efb38d

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    159KB

    MD5

    6e78dc563233a9451dcf2ee5baf6cb7f

    SHA1

    ba33ff0b805e53751d95f5508e44389f84345513

    SHA256

    93d95ff4eb8fd1bac00c5ed765d9c5a445c0cae200ed2cb42b616abf18207580

    SHA512

    2ae81dc6285bac4b78de1dcf46de4dd2d186ca513325af91c6e9b03101de2d1b1b9aa01b7a29fd2b9a8366de11817091748ee74d9572d838d0809604dc331c73

  • memory/1480-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1480-644-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB