Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    22-07-2024 09:19

General

  • Target

    8fea1b165c0ab995449e8a7d4beda370N.exe

  • Size

    40KB

  • MD5

    8fea1b165c0ab995449e8a7d4beda370

  • SHA1

    aa28d443c37369ed9db9183df03a4e38f00cae26

  • SHA256

    d27f8bd2e292bd360e2d49b945e61faf07f9c761ffd3abf745df9714308b5991

  • SHA512

    525a24f5eaaaacd7abd3a755db28ce1363d222f7da045ffa2b7a75263666ddb9142c9c25490f1f8e7de7ac7b459cf608fdbed9081f9ac3592b3985e7e81dc450

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATNyA:V7Zf/FAxTWoJJZENTNyA

Score
9/10

Malware Config

Signatures

  • Renames multiple (3037) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8fea1b165c0ab995449e8a7d4beda370N.exe
    "C:\Users\Admin\AppData\Local\Temp\8fea1b165c0ab995449e8a7d4beda370N.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2924

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    40KB

    MD5

    7b3d73d4ddf9fc9d7f2accffa99f0594

    SHA1

    497c2c0e674d740850de004159f5aea007c5d1c1

    SHA256

    3010b8825155fbe94ced7d81d649f6c971ff052cde5f483bed560f45843b645e

    SHA512

    eeecca946e01af0e60ab15befb4821e93332146ec0b7802244de0e0efb771934a925b12be1904954468ec704fa3ae60b0b782918c7852eedbb8f08471d7b96a5

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    49KB

    MD5

    cbb4f966f4749c2de0c66d5d80bb2ce5

    SHA1

    6850c57adc1061f11543499ef322a26d633d4a77

    SHA256

    d9621cbb652b868e312a7ee96ae03d269dabbba94eb09405174825019c97912a

    SHA512

    4530aee82f4590e1be0ea10a31594c02dca01a266e95bd79b004e793d5529d49a996fd9768d6dffb382f3500d38003c797e68260e047e0da63b206a12287f341

  • memory/2924-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2924-434-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB