Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21/07/2024, 03:26

General

  • Target

    5afb19b3538795b4c9f34d4d3f2e6ea0N.exe

  • Size

    50KB

  • MD5

    5afb19b3538795b4c9f34d4d3f2e6ea0

  • SHA1

    52ced9fccf62ed20d22b11ae309784c88a615a09

  • SHA256

    cb49e8885cb492bb448d63abedf1c3b917023ae202b00cb22f5133a59ebb8160

  • SHA512

    c8a7113373ddf80c39f37be32cfb55109465f108662e2b21df32e146adbee72a1deaea23d2479665209e1d35111d83e9dbb7f1615ce0ff35b6c1c64e47dd20e0

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFIO:CTWn1++PJHJXA/OsIZfzc3/Q8IZ0rfrz

Score
9/10

Malware Config

Signatures

  • Renames multiple (3179) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5afb19b3538795b4c9f34d4d3f2e6ea0N.exe
    "C:\Users\Admin\AppData\Local\Temp\5afb19b3538795b4c9f34d4d3f2e6ea0N.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2420

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

          Filesize

          50KB

          MD5

          b245d9d5babd5d2ea8f3775044978d97

          SHA1

          9be951d20d98f3180c34d26548699543473c7a4b

          SHA256

          7026928493aa9f04f778c8c7a938c30aff2dd806d8644eed946064f982d619ff

          SHA512

          1ae68fbf28e06bbbd9e5efa2550db147ded4644740facd516fbb5d5bbe582b99590ba7c656e05d3f9f893b4b646bf6aac8867e1ff84efe75d95e2a759c97a49c

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          59KB

          MD5

          df7f8acd1397ccd8a391f783e716d129

          SHA1

          e7d36c67f6868252541b74c272d37344e1e7d15b

          SHA256

          9296bb13e1b80e22b258caa2901d72e51a5995407bb5936d4b986603f31bfb4c

          SHA512

          5aa2936f20c9381612b3f55693d89565926a9c5088fa9a02e40e99a6d2da0e2659ffc395e2d69f94309d1eb527b9ae5e992054dcb50073eee7409b007ba912cc

        • memory/2420-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2420-86-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB