Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19/07/2024, 22:34

General

  • Target

    1752e9a8e99a2d12fc1f0b2a74c39890N.exe

  • Size

    94KB

  • MD5

    1752e9a8e99a2d12fc1f0b2a74c39890

  • SHA1

    9317ea59defeff7c572d359a689537f27b9b7915

  • SHA256

    0bd61d84e8ab699e17aa46a0a2aae058354b0e2c7c8a2e453cfcd91654f4d3f1

  • SHA512

    814493705242fd943c8fefe94998309678b4a537ebd380f23afd35ae4d11cb0e15de79d70acb9c3b663781bcbad943336504b6df685161ef9c385a91b9d8f661

  • SSDEEP

    1536:V7Zf/FAxTWxOmO/fxRfxykK3ZUkK3ZKYim43WYUNz8t7BaM0uV8TNyK:fny+Tuf7fs6km4r7W

Score
9/10

Malware Config

Signatures

  • Renames multiple (2737) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1752e9a8e99a2d12fc1f0b2a74c39890N.exe
    "C:\Users\Admin\AppData\Local\Temp\1752e9a8e99a2d12fc1f0b2a74c39890N.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2692

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    94KB

    MD5

    bbf6f473221a88a5a62cfea0aa8cdc44

    SHA1

    b103ff8db453873dc5329a2093612bef96e436d2

    SHA256

    320b96b8a7cb855080dc3eb0f3f7c3bed7bb12008078cc48cb34c8fcb42544fb

    SHA512

    cc9396bf29bac241bdabace0b630e7076a6a36c9ec6026f8ec5740da25e41f8fc5cea46a193bae56ff4e36485b16801b821a8fcb93cdc880552317e30256c549

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    103KB

    MD5

    602c040341951526288e9864bd600ccb

    SHA1

    7cc9f1df45a41fec8cfe80e63417462b0ba4cd67

    SHA256

    db875884e49ffaed917615dd77f7aa16b924b8d371fd9fbc32ae2dce394dbdc6

    SHA512

    23e15156cfc80a7cb28d8bc427a5b9b4e6006b526001c3af479ff7c356a83faad89d13ba5bf7ba54010901b77463b528a1c074ce40a99742b32ea1b2224d9026

  • memory/2692-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2692-384-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB