Analysis

  • max time kernel
    120s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/07/2024, 02:40

General

  • Target

    4accd58304ae30fe1cc06cb4b2e35f60N.exe

  • Size

    70KB

  • MD5

    4accd58304ae30fe1cc06cb4b2e35f60

  • SHA1

    7a23233ab0f6b8ab1024eb78e96d1fc7f4b48bdf

  • SHA256

    6a3db19b2054ab1b7fc42990bb33b9d0567e3be0f99dae1309d401b68b612f61

  • SHA512

    e0fd873a9f457f30c40b3afe2f92b73c9b0462155140aba33976662bc32147a797f17063986f20b531650d12b8789d872258c17708454a950591119fee37a75e

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxH:fnyiQSoy

Score
9/10

Malware Config

Signatures

  • Renames multiple (4643) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4accd58304ae30fe1cc06cb4b2e35f60N.exe
    "C:\Users\Admin\AppData\Local\Temp\4accd58304ae30fe1cc06cb4b2e35f60N.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3992

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1176886754-713327781-2233697964-1000\desktop.ini.tmp

          Filesize

          70KB

          MD5

          ddd3a3436feae6edb31e503e97b0bdf5

          SHA1

          2dd77e1fc0adf3348db6c157be90e38ff1e24812

          SHA256

          da99bc3144f67b6f7ecdd2cf6c2af0ba933013c2a7dc54f5a241ffbde72ec699

          SHA512

          42e8bc6f505aaf3d47bacb75891458dec75ee4b387e8ab11f39ed14afe83ffaf961c4fcd2b6d2374d0cc6c416147f9d5134a03ba97bba4e42985d7e22d5ff64e

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          169KB

          MD5

          c2067c36448baa987c33b8439de63564

          SHA1

          d7d1c142c2275a8a510825ee7d10fb7a8cced2f0

          SHA256

          c944232a25d8d672bb381bdda337568d71c7a2e1f9e697bbc1a520bdee4d7dce

          SHA512

          24a40a3b9c2d37fbf6572a4b8ada3858011aab613249ea15173f285b7c770f4f034de818eff0f32dcf478c161202ca886bcaa7e272c14775b7e54c6faf975be9

        • memory/3992-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/3992-1894-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB