Analysis

  • max time kernel
    120s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/07/2024, 20:53

General

  • Target

    0c946204b7416938417dfc0dbc76ba60N.exe

  • Size

    73KB

  • MD5

    0c946204b7416938417dfc0dbc76ba60

  • SHA1

    b1c145a3c53df951603f779f9d561f4e1e20fafb

  • SHA256

    997b74679da07eb7eb1b2e0f06bdb44fb96ab191669543deb0abcfd7f40c605d

  • SHA512

    64c8130f355cba2121be1817de66b54882143bc9317c6b5ca778d50f555754842bda9cf94f388405aa9d1244d7e6236fcc8556a441bac736365d0252b440ca82

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxT:fnyiQSoW

Score
9/10

Malware Config

Signatures

  • Renames multiple (4218) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c946204b7416938417dfc0dbc76ba60N.exe
    "C:\Users\Admin\AppData\Local\Temp\0c946204b7416938417dfc0dbc76ba60N.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4348

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-384068567-2943195810-3631207890-1000\desktop.ini.tmp

          Filesize

          73KB

          MD5

          1895bb7fbe877e0bbaae7a07218dadaf

          SHA1

          63c05ba79fb7e30b4e11680e49937f3a816b8dbd

          SHA256

          c60fd892e8fa7ae941ef610dc39b08ac5dc1156753cd9cd174d2fa6d9e292688

          SHA512

          823650da756fd0c88ce981d93d4099fadeed788e25c7496e556b90e4a2606b8e707135309474eb485df91ada2be31571e9e3ffd1cd5f8959b17b48c7a5adde64

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          172KB

          MD5

          c5f8222c6e754239bffc925d66acd6f9

          SHA1

          e86a63d05096bc1e8e848eb1e3188eba962a18d2

          SHA256

          aeccce5657f5709e989fd94f47de5953b2182ac09e277fa4656239e9d8a2f488

          SHA512

          276ccf927bb33ce0b251d067e8b0822a626be79800ecf23fe2293fc56b121ab5214701e0ceb6bd981362d89ef1e5ccc0db9bf3136e60cc7d7782f31792158f0c

        • memory/4348-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/4348-1782-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB