Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    21-07-2024 21:26

General

  • Target

    12b3976c371647b4f1163185cc6570e0N.exe

  • Size

    73KB

  • MD5

    12b3976c371647b4f1163185cc6570e0

  • SHA1

    9021a00b0390f9092847d97531cec52f9885fef4

  • SHA256

    d0df48e3e828e47230e178e5abc195d4acdc61aa1b64e937398c1143e2a5b51b

  • SHA512

    c09dba218e041c81e20fcdc144e789d528a868f525f066298a9ac53c62422d7b7817c5b166542760b678a03647fecf2589faf810627f2e36dd4e8a8fa66f097e

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxT:fnyiQSoq

Score
9/10

Malware Config

Signatures

  • Renames multiple (3161) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12b3976c371647b4f1163185cc6570e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\12b3976c371647b4f1163185cc6570e0N.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1984

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

    Filesize

    73KB

    MD5

    9970ff218acc1225984b9f08141a7950

    SHA1

    577c0f7ceea269434cdaa644bf27a33c3989c312

    SHA256

    4818fe04db8692885f70f43314f3788372f0bdff6c31e2314e174d81e2e3c7a2

    SHA512

    2cc9699af11c6f7fb28300aa0c234c8affc6d123022559e6ae3b99794bc82db141ffb025eeb88040d37e0d0be7d62ec83b165aed77f984d7f9e6cc2e8dfffafe

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    82KB

    MD5

    303fd2b08da835dafce7ca3fb26a4a18

    SHA1

    1e3f5e32a969489102139c3cc31d80822cd340db

    SHA256

    0fb03b36302f057b7a01b6a6c97af0974dec0611ce26b2d2e8a2170724584c2d

    SHA512

    9d75deef2e043ab038f7fde0d657a315b8ca58c5a89e784ee7edc3ae4d65ffe4deda69db90b75468d88a807c90421f122f8f16ab46f25e5ae8e0a74cbd77fb65

  • memory/1984-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1984-664-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB