Analysis

  • max time kernel
    120s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    21-07-2024 02:45

General

  • Target

    52a09d3b2c38590b9435bc40314fbd10N.exe

  • Size

    40KB

  • MD5

    52a09d3b2c38590b9435bc40314fbd10

  • SHA1

    edb97c935f1911085db49df7cb766b9508d4e2bb

  • SHA256

    4924b3266615ee57ef0753794857f7ea37909adaea824950448ad3b90a31683a

  • SHA512

    18fc3691ed2bad256ec115f987c118c7b0291b3c2f0f6705d96a32e3b81f54838a99b7e0da00e86a5ffe56facbb123d459048106e99e9a817d31bcdc08f3f245

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATNyC:V7Zf/FAxTWoJJZENTNyC

Score
9/10

Malware Config

Signatures

  • Renames multiple (461) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\52a09d3b2c38590b9435bc40314fbd10N.exe
    "C:\Users\Admin\AppData\Local\Temp\52a09d3b2c38590b9435bc40314fbd10N.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2928

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

    Filesize

    40KB

    MD5

    fd41b194b96c85f8b21323fa8237ea82

    SHA1

    8f57ba993a2076bc21b4d2288922059200dd6414

    SHA256

    00747f79e1ee2c9d7585c509b41bea3f62b0721b17b50cc608e280f0cfe00224

    SHA512

    1794c93e823fc8fb47beda65605a1905d9c20bcb1724d998d2d2040b813c4dffd4fae7cc5e1a6e005666d149bad82a5af6b87520bc1365dd58adf1e0b3a79177

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    49KB

    MD5

    8ea21de004f26835136b0a3f6b966264

    SHA1

    f01d81af861c9e2f9a7ffa42d927cd658ce1fafa

    SHA256

    545679cdd7672a376443e617c8ce740c6a32390befd8a906ec8da90f64f40513

    SHA512

    d97b75fd1d64693d5743a0e02f725d1a619511dc730526979cc5609ebac1b9de6ed494b0c6e9b98263df42c7128255dab106ae2ffb9c83876eac43b67ff0f777

  • memory/2928-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2928-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB