Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    10/07/2024, 21:16

General

  • Target

    36cdf08677441e55454183e46009f8454cde5544c27102aa51e9ebcef929d7e0.exe

  • Size

    21KB

  • MD5

    fa4af53ef11197dd84f7ad3356126cf6

  • SHA1

    dbc9b67ebf18dec19e7f7d7013c4bd99c20ae3e8

  • SHA256

    36cdf08677441e55454183e46009f8454cde5544c27102aa51e9ebcef929d7e0

  • SHA512

    550aa426e6f3efd6459dae4999f4fc379c615c284043fcdca9b51de7c123677313e23c8a3821b437b5e6d1e50bac506d50e709e92c38052b8f8e4d5f22a102b0

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJPbUEobUEnr8BpUjcVer8BpUjcVSoZnOriJfoZnOriJ9:kBT37CPKKdJJTU3UQreUYEreUYYoZnOD

Score
9/10

Malware Config

Signatures

  • Renames multiple (3745) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36cdf08677441e55454183e46009f8454cde5544c27102aa51e9ebcef929d7e0.exe
    "C:\Users\Admin\AppData\Local\Temp\36cdf08677441e55454183e46009f8454cde5544c27102aa51e9ebcef929d7e0.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2104

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    21KB

    MD5

    44401a63afdf60197c436de3cb58693a

    SHA1

    5ecbc5ead71b039187ea736546475d82a61e2702

    SHA256

    748e145d3ed28abb7878ec87fcc8068afbfb2e6505e4330530b2aca19105cdad

    SHA512

    4fb295491b45891a64cf13ea639cfe63816faf9dcb73ad918151f879ebcabc773262c95beaec2e0bb9bc5cdb34f8164f1bf0364327c17b673e9131beb3ad840e

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    30KB

    MD5

    a12cfdc6b5ec0cf8e22f9a00431ac459

    SHA1

    0a43f8ff2bf2ba1367c4819eed6668cdd8d7d160

    SHA256

    4899a87b0d994b577988fa7d8517ca446ecf068e76c723c57525b4cc514d7e5e

    SHA512

    7f1bc0f2acc78b0dd67a1450c3ecce1b47ebd897908d6a60b1ceb58e36484199426c1a66e7824fb4198bc0c82f2b65188e89a988e6854fc0b851f661fa3beadb

  • memory/2104-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2104-76-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB