Analysis

  • max time kernel
    119s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/07/2024, 07:20

General

  • Target

    6b7a0fcd0e37de38fa28fedb2e439f20N.exe

  • Size

    139KB

  • MD5

    6b7a0fcd0e37de38fa28fedb2e439f20

  • SHA1

    ffe88016632828b62b62cb9abbb1faf02b3a68f1

  • SHA256

    71d18a732fe05d6cc5f2e59fe17e82e366182666aa1a038383313050b9b6513a

  • SHA512

    2d15e400ef01c6d33c71dda73607afe76aae635241ff75b3e56f4d66999a1442e1116ee89893fcb820cf4eafb3b8daf32b3f6cb1464aa37a0ec2d577d05f57e0

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8IZuEd4HZKMSs9w7WsLhEC7ptPqPZlyN:fnyiQSo7Z54HZKMx4dhECVyo

Score
9/10

Malware Config

Signatures

  • Renames multiple (4311) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6b7a0fcd0e37de38fa28fedb2e439f20N.exe
    "C:\Users\Admin\AppData\Local\Temp\6b7a0fcd0e37de38fa28fedb2e439f20N.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4752

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-47134698-4092160662-1261813102-1000\desktop.ini.tmp

    Filesize

    139KB

    MD5

    c582c1218f9b5ad24e93e1cd5d179c34

    SHA1

    5ea4980799c6f3036e68e3da99cfbdcd84b93321

    SHA256

    d68bba4f51b2c32216c74fdc899568ed78acaa70ad1e8328471fbff26e5164ff

    SHA512

    f6195dd02296366e1946ab813bc6a77ef374f1f8ca924118a486f764bc0b1bce4c4d92711a7b811af207937438ca78b445d5911b810c1cfbad65e8da41003a86

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    238KB

    MD5

    8813be8e057d7660b9d7e0af9755c412

    SHA1

    22e5b03c110885d3e6d1c2494f58b72bb6955005

    SHA256

    bfeb41780c87fed801b40c97aa2b9b04a648038fb54288b11ad41e25a4cfe5e3

    SHA512

    87b7806dd9b2a263c39f61dc1ee7a403edf4e317c94727cd3a602cb12c2d6beaf093c517a58dfa96c200d0cf04fdd649a0d68f192c745d4f835ca515f5be5bdc

  • memory/4752-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4752-1788-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB