Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-07-2024 03:27

General

  • Target

    a7961c5b54d58bf0e1d9eb88f04067c6e3bec4ab63fbf807888bf545a6912592.exe

  • Size

    118KB

  • MD5

    e4fe7cdb6ea7842ffa62d146823e616c

  • SHA1

    64173978f1d04c605a38963fb5b4867655c1764a

  • SHA256

    a7961c5b54d58bf0e1d9eb88f04067c6e3bec4ab63fbf807888bf545a6912592

  • SHA512

    243132b90efd0809e29f6768844c4da825dea9321c3d204b9fcc82a574b0ed444592ef51c3bcfe2ef11ff60a83cdaca5a598ad60751582abc90544a6c6a784e0

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxvTWn1++PJHJXA/OsIZfzc3/Q8zxq:fnyiQSoaQSo7

Score
9/10

Malware Config

Signatures

  • Renames multiple (4638) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a7961c5b54d58bf0e1d9eb88f04067c6e3bec4ab63fbf807888bf545a6912592.exe
    "C:\Users\Admin\AppData\Local\Temp\a7961c5b54d58bf0e1d9eb88f04067c6e3bec4ab63fbf807888bf545a6912592.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4732

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-464762018-485119342-1613148473-1000\desktop.ini.tmp

    Filesize

    119KB

    MD5

    64ba09aa55522bbc409c0afd840dd6d9

    SHA1

    0f809af36ae47884a4ad0249a44605d2e446f02a

    SHA256

    dfce21e0f40b1dc1d4e38ef610dcce302f0be8a02278ed9ebd6eeeec06a417e8

    SHA512

    ea23a63aa6e27537afbbad0920de17cfb85d9b8c01e628d255c9ecbeebc25e00ae44fee596942f6a14d7c39151a06f01c14f9dfe12e69aa858ccca445eb092a4

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    217KB

    MD5

    612d060b77ff0b7d68477dd564f5bdf0

    SHA1

    a64a9433b8d081deb6221209beb510249a738969

    SHA256

    af3b140e71096119ea0c2ce053a0dcfb052d0f5cfc769204f19a8563dbf1cf1c

    SHA512

    229ada1b545135aa364969a0f2e4dbe9743cbdc28b57aa9d6d3f7015a62e098cd9ae951b457da83841483fa9ad03eee0d869302221e32efe671299eb8a4dfc9a

  • memory/4732-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4732-1650-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB