Analysis

  • max time kernel
    119s
  • max time network
    108s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/07/2024, 14:27

General

  • Target

    c143e4a06cd516249268f8f3f51fd6b0N.exe

  • Size

    63KB

  • MD5

    c143e4a06cd516249268f8f3f51fd6b0

  • SHA1

    951f1d0ce5542ab5ce7036b03a265c12d7ab0dad

  • SHA256

    9f1a39639714ffc31447b9dd8889558e70fedd40ddc0e30e726c7c44204469a1

  • SHA512

    e7006e339127302e4e6416f79e534b5619827f59ab4dc5094e9f082c6336b9a83102bd6226008392334dfc1b920dbbcfcb6c36f05958cd33b366fa23f3e3cecb

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rd:V7Zf/FAxTWxOmO/fxRfx46Y

Score
9/10

Malware Config

Signatures

  • Renames multiple (4311) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c143e4a06cd516249268f8f3f51fd6b0N.exe
    "C:\Users\Admin\AppData\Local\Temp\c143e4a06cd516249268f8f3f51fd6b0N.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3912

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-384068567-2943195810-3631207890-1000\desktop.ini.tmp

    Filesize

    63KB

    MD5

    9658b8b9ca0b071c29c61e79b3956a6a

    SHA1

    7968a54283f25801022c66a65c0e28f9a8b2d60f

    SHA256

    ab3e868841299e64c19d4164034152c84aec0f99e5ad01a69e79f9355c25f4ae

    SHA512

    36295e5e131c2a660671def87bf7479a8a201e70c4a76a345ad19c68d1fe43f3028c876d1efbc5a8cbc0bfcb5044d6a50deff1d9ba52d620bf58467b2cc65a0c

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    162KB

    MD5

    8e4e213926539ecd10cc3d0ab382d6e6

    SHA1

    824ee0c0d6870508b8168ce94549182869c3b65e

    SHA256

    88a34a5c0746cd26864e010ed6d2ebfc4d369a07c48f95d1558cc3859e9ed5da

    SHA512

    bc3583b1459a1fe518a006bde60a5e1ee8bf36d9eb91adaba36c1d55290f29a21650f2b3b5a9b644f9ab7bf5d3e8320f63118e2339980857931d4e14f95a3fe8

  • memory/3912-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3912-1784-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB