Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    15-07-2024 01:58

General

  • Target

    5e8723ac95b89088413e9c6cb0b03280N.exe

  • Size

    50KB

  • MD5

    5e8723ac95b89088413e9c6cb0b03280

  • SHA1

    8fa972f6950557ae6f6aaa3f24c8ecb086e748e0

  • SHA256

    6ea6b7bc47d591b08a690825b4c2cab7856fe65b8f5954d538272a797db08418

  • SHA512

    a4406858b28aa5436ca3b1a65be6e1f7084d5241c8eb495135d7e9516626aff2c7ed9cbab4885dfc7ecf0848fa47cafb765a060c507c8e0268f9a9b40a33a6b0

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFo:CTWn1++PJHJXA/OsIZfzc3/Q8o

Score
9/10

Malware Config

Signatures

  • Renames multiple (3267) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e8723ac95b89088413e9c6cb0b03280N.exe
    "C:\Users\Admin\AppData\Local\Temp\5e8723ac95b89088413e9c6cb0b03280N.exe"
    1⤵
    • Drops file in Program Files directory
    PID:484

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    51KB

    MD5

    483ecb0c529cb6a3c8685eb7774ee76c

    SHA1

    53ead5aa7c9627cbfe0c3d83a226c9b5c244e5f5

    SHA256

    254522a09e6871063bf62bb2cdd94cd36ea66870dd17460f80ebf5ea7adf59ae

    SHA512

    461f7db4e5708158eb32183db63d6e37d8cd205882ea3a0b5ab38c31751c7adff72e11040437f4f033af45f3999bd40debbdd3564df37dea5e605749e97e769a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    60KB

    MD5

    fc5d0172998229aa0f136ebcf10c13e6

    SHA1

    76a9ad21449969da8d9849a828c1d44762b5e8ea

    SHA256

    64c1b71a2aa726a17f01b066620edfcb056a7dd3892ad8d92fa214f15edb3a95

    SHA512

    3c02120be7fa72fd5b7f88ded51aa588b85fa73eec9aade1ddc09e7e2078dda0656ccaf9da14b4f377198959adbd2fddb262def45e4b840511c16d8c1c055658

  • memory/484-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/484-86-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB