Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20-07-2024 03:00

General

  • Target

    3fcd0c218b4b2dd9646f5f9cfa74b0c0N.exe

  • Size

    47KB

  • MD5

    3fcd0c218b4b2dd9646f5f9cfa74b0c0

  • SHA1

    ec9a63f99e8a8282d5f7a3da9b0402933e07633a

  • SHA256

    594eee9fe70a913c4ebfa0569e254b9ea6e7e186f0473daf8d7898bb97c764c1

  • SHA512

    0cb9314ed7cfd5311b106c7bb0e7491184433a10e770b594b487250516030a09071495908a4d0c6df73eade580ac921400d8455ecceb218b5da842dbbd36ae35

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFIx:CTWn1++PJHJXA/OsIZfzc3/Q8IZn

Score
9/10

Malware Config

Signatures

  • Renames multiple (2572) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3fcd0c218b4b2dd9646f5f9cfa74b0c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\3fcd0c218b4b2dd9646f5f9cfa74b0c0N.exe"
    1⤵
    • Drops file in Program Files directory
    PID:236

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

    Filesize

    48KB

    MD5

    4723ced132d4ab89cdaf2d8f7ce0d73c

    SHA1

    0d6d9dc4c850bba897c2e9986c0cb47dc4372daa

    SHA256

    bec28878ebea293930164db4c4caf4fe1b34deb396a06fe127dd1c621403efc8

    SHA512

    6d1c97b6410752d7f97a9981047a1d72ccd064895d35dbc82b5afec2b49ef6f32f6c4a75d5e9effd02d27520a972dc5e67cc0f96dfd46dcc41d318033c10ae89

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    57KB

    MD5

    adad5674eec99ae85d3c06640ca024cc

    SHA1

    38412b2d3c101c8daa106313a639a07ade1ed25e

    SHA256

    6cb303f22ac5d05aab893a0917dc36e686eceff0725c9ae3a5f2ba1ecccf85b8

    SHA512

    fa26dde534776c17869a04f3dc00819b0575d0b1ed61694cbaca864cd224eb731fc391356179df1c6d8862c36959204c301bf496f0db41cc43287d6e30647808

  • memory/236-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/236-74-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB