Analysis

  • max time kernel
    116s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    15/07/2024, 12:59

General

  • Target

    decbc55acfaa4df4887aec28a8b88610N.exe

  • Size

    51KB

  • MD5

    decbc55acfaa4df4887aec28a8b88610

  • SHA1

    3fab9b6babe62d3183696b1c7bbadc90a08c9e81

  • SHA256

    76cc2023109cd7d5cfb9fa68242a480b019da3a466f0861ee5e79e1adf45be8c

  • SHA512

    e6a4658d9118e790fdcf6696c599a4263d54f3e8b14d335018b13e6d88035517cce1af808f6200e8503cb5e6750432e85238360ee891399a9905761c24cc08ed

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFIZ:CTWn1++PJHJXA/OsIZfzc3/Q8IZv2U

Score
9/10

Malware Config

Signatures

  • Renames multiple (224) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\decbc55acfaa4df4887aec28a8b88610N.exe
    "C:\Users\Admin\AppData\Local\Temp\decbc55acfaa4df4887aec28a8b88610N.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2284

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

    Filesize

    51KB

    MD5

    c8cbeac48823045b987a278c708e045a

    SHA1

    a76c1b3f4a1277489a145baeee9eecf7d3142ce1

    SHA256

    0f55352ae4711642ee0765684a9f1cfdbf10e41e39ff855ca9032ff6a1eca2f0

    SHA512

    4d442502f38203d2ec1e0fdb5f3340724a2c619e49c090e647a78d6554d793582dd7e7c36a586873f0262f8d277c6a1c5b35bca84d4007b972aed434b74e255b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    60KB

    MD5

    ccdab8f6967829386855e7afd02fc504

    SHA1

    9e020f1386a9c279387690ac1a70dfce26221979

    SHA256

    f0a95724460a54efeb66559f8e66e09752b1af5a7f3526bc7951b3c61e5ec391

    SHA512

    ee7c83f52d68d9a2d409adf6e0e3a5421e28c461de6747d7f23debcd844b2ce33552a1d86f04115b4d7eb2966bfe5a82de2844100c833a12001b98fd74d1464f

  • memory/2284-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2284-18-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB