Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/07/2024, 19:58

General

  • Target

    0135c75a49d7ed658d4b47935fc23b70N.exe

  • Size

    70KB

  • MD5

    0135c75a49d7ed658d4b47935fc23b70

  • SHA1

    23e89959db075c6fcfa0e717849733bb7ace0ab9

  • SHA256

    a194e27e1182e83ea3cbcbdaec703a0f8b689d4f1ba87fc5ed0ec3e8e4870780

  • SHA512

    5dcb5f01612b41a0b20811868224c844e72c40db137e883d1fafcdd22627a36f3fe24cf435759754b1655f7c02249f95374aaa045a4637050da17965684c4cac

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8IZqpBpd:fnyiQSo7ZE

Score
9/10

Malware Config

Signatures

  • Renames multiple (5024) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0135c75a49d7ed658d4b47935fc23b70N.exe
    "C:\Users\Admin\AppData\Local\Temp\0135c75a49d7ed658d4b47935fc23b70N.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2864

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-701583114-2636601053-947405450-1000\desktop.ini.tmp

    Filesize

    70KB

    MD5

    455898f6e81fa3868e9d7f8c717227f3

    SHA1

    e2cca1a647707999a8f32fa05fd2b1f67d6126ef

    SHA256

    651ccf51c9aeecd1656ae105b8d7fb5c0e88d0a475f030c4926b2eae35774a75

    SHA512

    621c448fb0c099805af0bd1ae5c39ff9d3cfe301a481454f65180c0b1851c973c8bb17e8e768ca8887d75819efad62317b7d417e296248c7fe0e68bc02d6d038

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    169KB

    MD5

    e57a52ca70e14253e1d293122ab4f391

    SHA1

    25e07e8439f65c88ef443572ae1e176efb40c529

    SHA256

    37ba70b3bd37cd5769f5e3591be42da20225ccc61ed1626220ffa02c48b666ba

    SHA512

    4bd8957af00b25806839abfc4e73b6c202573511e0c1726057ebca784d3b418f3412c781bbef679c7e36889860725fd4a608711c4cfec14da0e4467a8efac618

  • memory/2864-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2864-1802-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB