Analysis

  • max time kernel
    120s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/07/2024, 22:36

General

  • Target

    1f924e2244360d0901ee531d37d86600N.exe

  • Size

    23KB

  • MD5

    1f924e2244360d0901ee531d37d86600

  • SHA1

    28df62a71632a25ebaddeeaf54736adaaba01000

  • SHA256

    f97c0b370a5c81edb947610432120dc0d14f2139404c7ff806b073604e18c37a

  • SHA512

    5761208108dae3101fbb159a9bf163a7554293c61310af9df31e7f29ea0d0dbe6086c0d1a59e911eca8da45b9d178a4d7ab0fa89c9b4f9a28f0a032a4a3694d6

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJcbQbf1Oti1JGBQOOiQJhATm+uA+uRtnAtneBWjWl:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJG

Score
9/10

Malware Config

Signatures

  • Renames multiple (4657) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1f924e2244360d0901ee531d37d86600N.exe
    "C:\Users\Admin\AppData\Local\Temp\1f924e2244360d0901ee531d37d86600N.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3908

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2636447293-1148739154-93880854-1000\desktop.ini.tmp

    Filesize

    23KB

    MD5

    b3527a22810730758133e176cd484f63

    SHA1

    28b46f0d87a47aa058a2118f483f96149028edfa

    SHA256

    eef20cba8d9b83567b6bf7260c66474cd896749809ecd84941a57a56a672018f

    SHA512

    6098d2057f58fefc4148dcf419022638ddb064bb5f16268f59c079698ff0d476b68f9ebe8cee4844cfb9ee614b52f13e84ea493ddc835eb1fe9e09d150f573f5

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    122KB

    MD5

    dd6686325d8fd0104bac51335b89cff3

    SHA1

    0d81444dca141fbdc235f190db58697c4153aed5

    SHA256

    eff2d5b5e12937162744535b4a26a32219f05f71aa7b0a5c1001390ed56b47f1

    SHA512

    b6d6c40042f4338a4918d76f6fbf349d37a484885206a1fab69dfca4976b8d571b3011c3a100c70ddd07210a0747e12fbc93f310562b168b4719023729836642

  • memory/3908-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3908-1204-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB