Analysis

  • max time kernel
    120s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/07/2024, 05:58

General

  • Target

    768c6c09c6f32a70747f2ba9a44a01e0N.exe

  • Size

    89KB

  • MD5

    768c6c09c6f32a70747f2ba9a44a01e0

  • SHA1

    1783d0e1292cbdef6f976a63b3cf2e1051bae711

  • SHA256

    0dbc9cbde1e79ee1dede982d557eabf3faf927f77c0be9155ac53c2399ba52d3

  • SHA512

    e3cee9ae5a04e5512948eb9e3b93d800a5e9e331ab06fe1ac030bc4c09536588f225386ae7ac388d42c22281aaf9adbb69681872956cea27e634db7cd634d600

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxviYiaE+UpCUpy:fnyiQSo4iYis

Score
9/10

Malware Config

Signatures

  • Renames multiple (4362) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\768c6c09c6f32a70747f2ba9a44a01e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\768c6c09c6f32a70747f2ba9a44a01e0N.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2860

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-701583114-2636601053-947405450-1000\desktop.ini.tmp

          Filesize

          89KB

          MD5

          2d6ebd09e834dec98a8ff3c8aadcc54b

          SHA1

          a42eb9cb8b950c4d5f38ffe5c9a5431b8165d2ca

          SHA256

          fb86282a878305f69c59122e0289b2962c32f399f0802f804469fd88dca1cd06

          SHA512

          ec41b631c7646349df2ed2905e8c2fe5dd1fb0298337e1343a04e2b2b415c0b1649bd3ee2c7c9455c554b9728ff1fe712c0ea89d46c910f1b481e71d5af57f57

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          188KB

          MD5

          22bc4f0e7ed176e4bc563c5321f5be4e

          SHA1

          f6d6d414044254a58a655f8d14edb76ef9354809

          SHA256

          9939feabc92d59d070ec04dc20efe8a02f36f60047170ec583fc09ffd5cfe80a

          SHA512

          8c7d370f31395d82029021cb76c3961708bfc712deb7f6ef02e58b21e9e7d07eab0fa90a4fbd60d0c46f96eae8b8b7536a8f730a36f5b0635865f00e830dacda

        • memory/2860-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2860-1800-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB