Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19-07-2024 05:05

General

  • Target

    5727562f999db65133c8b7e376ce0d80N.exe

  • Size

    53KB

  • MD5

    5727562f999db65133c8b7e376ce0d80

  • SHA1

    92dc6e7a83477ae7926dc7bde573a0144020f193

  • SHA256

    0fd630cd2a3a40e5a7c91e7b40b82674fb063106fa8d312e89c6ca9b28114f94

  • SHA512

    579d06b40b00c05ffbe761f6f122b7d7b40816397de4ab1f6daa8c490ab0f0938ece521d3173be1c5e13cdfabf92e53ba416a40aa219dab7df2363ca9b1e842d

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcB:V7Zf/FAxTWoJJ7T4

Score
9/10

Malware Config

Signatures

  • Renames multiple (3256) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5727562f999db65133c8b7e376ce0d80N.exe
    "C:\Users\Admin\AppData\Local\Temp\5727562f999db65133c8b7e376ce0d80N.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2136

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    53KB

    MD5

    4cab11e4ff5c45dc8705cf50c72aa90b

    SHA1

    435ce757b7680fa4cbf5d211ba38cba99e14f0e4

    SHA256

    36c78e4467c48af5cf3d6bc421b44fac697ff29f6767ce9ceb817f328962ccb9

    SHA512

    1072c5b27cff7de1f5bd651446eb889f73227a6f0ace0c2520663ca10e3eb9ea536351aa1fce22acf55b204d43f45a64cab77532f27474e5de022c4e4b064608

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    62KB

    MD5

    3a265d562b6b3d8d6ad9bb9daa858100

    SHA1

    87f69acbeebe7fce054bfd50e7e707be99790d28

    SHA256

    55102f3c339f57b7079f7f7b7d5a4ecd50eb44c9274ec2281af289ddd8378b40

    SHA512

    a8a6943c7c49c0bfa5d83050972e5354fda11ac69845803d186a4d737103e3ff05c9c6d1ca156df3e22cbf545b681e4486438875439924d7343e59aa8260f875

  • memory/2136-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2136-662-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB