Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20/07/2024, 02:23

General

  • Target

    3b2d756f9c1d6c09386e864995ee6f60N.exe

  • Size

    48KB

  • MD5

    3b2d756f9c1d6c09386e864995ee6f60

  • SHA1

    42f10e26dc537fe3512a943449d0e75500c74de9

  • SHA256

    ec6d0662e4962794f9604078869c19bc5a4f5081a6e2613421f58f11aa3f68e6

  • SHA512

    3f0d99b6621e9942050d4530d906e2328b39fa73fd5e72aa6c87250fbe8fb2b34b62c5c900fa72c4c7a9ac22428893364aed13c7a35f4ea4f7bb696421751de5

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFzP:CTWn1++PJHJXA/OsIZfzc3/Q8zx2u9

Score
9/10

Malware Config

Signatures

  • Renames multiple (3307) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b2d756f9c1d6c09386e864995ee6f60N.exe
    "C:\Users\Admin\AppData\Local\Temp\3b2d756f9c1d6c09386e864995ee6f60N.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2480

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

    Filesize

    48KB

    MD5

    8df0f9cb4cb47361f9e47c64cee0ee3c

    SHA1

    a74fe9a60cf7782fa0dec730bb7f2c7155bf110a

    SHA256

    e8c5a441a5484960960fc32e385ccf43e7e7550fe26cefefae8e4110c28604e8

    SHA512

    b9b586ca5f9048b20058d292b1cd00fefe8218587cc6ccb325ef590b0b72104bea2532d35c61535448dbce53657a74b098d18aeeed4c07c978dca4fc2922c1b2

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    57KB

    MD5

    52fd0c276895e6c497457bf977d44df1

    SHA1

    4e2c0d4b0622b6adeca20523e0f54036bb6aee02

    SHA256

    8bd15db60a552b77b33e81a71a6b8d994b7a6ed5e8603ee78e14124a41f13cd7

    SHA512

    5ebbcf2e5adefbe4e71cb095ed845fd5b8e9fa3b4546fbfb25ce48e085350f42b442ad79c3d04f9d744f7fd5d19c0a1ee0558a545c78f4ba4b4a4fae7301988c

  • memory/2480-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2480-76-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB