Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    21-07-2024 09:29

General

  • Target

    a3fc6e2090d23e5c6aad126f51096d20N.exe

  • Size

    69KB

  • MD5

    a3fc6e2090d23e5c6aad126f51096d20

  • SHA1

    0ba6817af405c320d0688bb0baf56df96cf6543a

  • SHA256

    b0d43d422beb213b2c7c7323b038a29073e3f1be932f69f23dc634e3271f0d08

  • SHA512

    3461b567679c7dbd0e7bfccb0754afda691516008a3a6ad55d68b4951d96dda5d1909c46a06002cd159d88c4d581e6c17d91a005a2b6ae04a3a0146f23ab496c

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwABT37CPKKdJJxdPO9Otu4Ub6:V7Zf/FAxTWoJJ0TW7JJQOns6

Score
9/10

Malware Config

Signatures

  • Renames multiple (2842) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3fc6e2090d23e5c6aad126f51096d20N.exe
    "C:\Users\Admin\AppData\Local\Temp\a3fc6e2090d23e5c6aad126f51096d20N.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2112

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini.tmp

    Filesize

    69KB

    MD5

    08078ad64dcad775c3e106953a9d5838

    SHA1

    6d36487352b1a57c435aac32bd2f2ab0c5b3c709

    SHA256

    e3db6d02c8417d23e6215da1414f1c2faa7c22edc39d7938a9767675fb4841b3

    SHA512

    a7572f4c672e5e8c22ced3f2a83978aca3143d829e8b4840575c45f47b2f39e11d4753f8d8084cdd4c466a31f47b3eb163dda8e9e2ce0c003f395587b40a05a6

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    78KB

    MD5

    ecf21015687e4e7c1fec281a6473892a

    SHA1

    bbe7aaac8d370a762c6dab6224308b2c99c41938

    SHA256

    c0618a06231da747406d54f6053b468aed427a4437e0396fee2e17b461f988ae

    SHA512

    37f278e2ad5954f043a9595c92d51b1cbfd3284515a25a456110a96e1e5be8d881080cca7f097e5ee4bee35ab43e295fca2e14c22677e712eeaffa652c206c1e

  • memory/2112-3-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB