Analysis

  • max time kernel
    119s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/07/2024, 08:31

General

  • Target

    96b795c6f4718211a67d8a2eba35d3f0N.exe

  • Size

    49KB

  • MD5

    96b795c6f4718211a67d8a2eba35d3f0

  • SHA1

    28372ef73200be18a4ab46c743aa9c4bac673be4

  • SHA256

    140e41547f25fa6850039865028aa7448e76ce32b312ee5a336a4a978af44a53

  • SHA512

    382a24ce761fdbcf5bfe3f887c493ca9a3b710f8c03c216831a5253799afd48ebbf132af3b2ce4a45dcb2d1bac44372c351f4d3d1b16239666abadae020085fd

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8zxDJevJebA:KQSox

Score
9/10

Malware Config

Signatures

  • Renames multiple (4655) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\96b795c6f4718211a67d8a2eba35d3f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\96b795c6f4718211a67d8a2eba35d3f0N.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2424

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-384068567-2943195810-3631207890-1000\desktop.ini.tmp

          Filesize

          49KB

          MD5

          15912c997a071c1055e0ffc2ac00b6d0

          SHA1

          22776ea91325feb284c0e6ebe2fa45136a8e586b

          SHA256

          0bac93d52e3e8ed8a14e7c768d5b8811b125346d8a7c2c110c02ec739df77431

          SHA512

          74058a84ae1e4a7adedc8b43d85db7565f73d04d3e7c864cd650ad5dbdc689efe880ef84d8ade4c26dd66ffe9c6b7d7629b9a9dbea906dd6ee86bcc7b0cdd59e

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          148KB

          MD5

          9a0d254ad3324f045f7fd258b5102ca6

          SHA1

          7c34dcf15e5042d8b060c6b6b91d7e773fa8ffb1

          SHA256

          82b69e480fb2972174208995f7a6a6a2e80ce4c0577820fec64abd67b4bd8dc5

          SHA512

          b9db790a2f8b1b6db2a1e1e3f5abad8f01ec53bf6f93c4ba80f4376ed006900fdfd061a9019e0be61a7fe0907527f5833cdfb494746ba7fee86438b06bf1b787

        • memory/2424-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2424-1150-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB