Analysis

  • max time kernel
    120s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22/07/2024, 22:11

General

  • Target

    1a859e3eebacfb72969188844e5821c0N.exe

  • Size

    44KB

  • MD5

    1a859e3eebacfb72969188844e5821c0

  • SHA1

    17b059416c5a02e645d94502423d3f7face94cd6

  • SHA256

    df44a95f85d146c83e1b72c96b7671ba1223854e0dca1da88f23ab25230253a0

  • SHA512

    a006c1fbe0f7fadcda5c95dc4a8977add617f6d3774399aa46721766cb79f92bc66718c4990ef9b3e4b55b2d205b5caeed098006295b9639a17f452a206bf545

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFIx:CTWn1++PJHJXA/OsIZfzc3/Q8IZ3

Score
9/10

Malware Config

Signatures

  • Renames multiple (291) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a859e3eebacfb72969188844e5821c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\1a859e3eebacfb72969188844e5821c0N.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2056

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

          Filesize

          44KB

          MD5

          4d5b509d924eee99a0341d57cac171fe

          SHA1

          ee1760c7326a00c0cb9f0f9ae0c7c907d297871f

          SHA256

          ea466419bc4dd6a2f9f0e313162e3152640b13e2c10077f86284f499f96b3e69

          SHA512

          334f176ca857ebbf271da916da1c6df6cd2750fa19265180ac5249a6ce28047bb5b3355ceb76416b5fad7ee3154475f798c43f3d721aeed437b2fd65b9a7a6b8

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          53KB

          MD5

          7f62e1bfbd32f5d86d777e5b7d0b3d0e

          SHA1

          ceac714aff7514d9032adc0fad74a398a7634e70

          SHA256

          e1b35466c7c697338607964b0bc69ad2969b2656200492c74d31077c62a0e3a4

          SHA512

          b844f763c85b777e6b1259a0efef0d441dbdf36612da25465c676ae426a092e3ca90b59eda65dc42502a42be78c1ee60762b0676e6b68087dda218638a5a3384

        • memory/2056-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2056-26-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB