Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/07/2024, 22:46

General

  • Target

    6f1a4bca0abacd06c19258fb6eca84603ec61329c41e29b2c894238ec1223feb.exe

  • Size

    33KB

  • MD5

    1259d534491263edb3da4306a3e97f5c

  • SHA1

    60225067f3ae365b5d005b8ceb15090341777116

  • SHA256

    6f1a4bca0abacd06c19258fb6eca84603ec61329c41e29b2c894238ec1223feb

  • SHA512

    8ad2880f80a3c7f3daaa84ae3430668a421292c2c43d14faed69766a9fc1065db8726892527f5da9025defc22ffd8f85f03ad223e5ee0c2a41e910e0f142321c

  • SSDEEP

    768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcu90TKe+0TKeIiKx1:CTWJGpGni

Score
9/10

Malware Config

Signatures

  • Renames multiple (4872) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f1a4bca0abacd06c19258fb6eca84603ec61329c41e29b2c894238ec1223feb.exe
    "C:\Users\Admin\AppData\Local\Temp\6f1a4bca0abacd06c19258fb6eca84603ec61329c41e29b2c894238ec1223feb.exe"
    1⤵
    • Drops file in Program Files directory
    PID:640

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2636447293-1148739154-93880854-1000\desktop.ini.tmp

    Filesize

    33KB

    MD5

    d9a44f6d944b8439c66008321930f6a7

    SHA1

    b867664d982d56273a3bad42b76c49b1e335f0f4

    SHA256

    0545353f74ac4878bdeb6fea86e0227fe6112f399491198b19a529cb99ad1e40

    SHA512

    ef26239f4f6dcfa781d14c4e0225387c9fe730a0cf260c22150a055c19dc877ce7378c7711e2cdf03498b7aff8f61343c08af8cac468c2e42e165d9e91f916cf

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    132KB

    MD5

    81c063c033c9f65b8e749b4481083845

    SHA1

    57c613a6ef6d86a0fb36473624a4cf421344f209

    SHA256

    00d3ded1762c1b1db7ed6efa33324e1a549267b3dfda3e3d5b992fa3df501532

    SHA512

    1d1565d09ea610e049d149222a79c2c9062b812d78acc38d9caa9bc9157f6a1bdea0120585b7e97f3f60ab36feb9b13776862de2809c6ccea6fe442a9ba3d176

  • memory/640-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/640-1102-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB