Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    22-07-2024 14:32

General

  • Target

    c20633908ed5e566a3732799e97600d0N.exe

  • Size

    150KB

  • MD5

    c20633908ed5e566a3732799e97600d0

  • SHA1

    6ed9e98d2c0970acac1f2fef27e523b56b8fa2a9

  • SHA256

    3ac1c40cc6d1c903b2cc06e9120cc3371193976169b0b472958a6433acf1220b

  • SHA512

    8fa3f851c691dd06671287e8a8754138b98f1bf6d3983f45d21af0c9efa85eb6e5f5653a54de73eaa2c92c1938443480e7768e71c3f67bcdd59cf9b48a0ebf79

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8IZuEd4HZKMSs9w7WsLhEC7ptPqPclyah:fnyiQSo7Z54HZKMx4dhECVt1HB

Score
9/10

Malware Config

Signatures

  • Renames multiple (2706) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c20633908ed5e566a3732799e97600d0N.exe
    "C:\Users\Admin\AppData\Local\Temp\c20633908ed5e566a3732799e97600d0N.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2808

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

    Filesize

    150KB

    MD5

    ac8cb745a3ab587bf2ea79420a5b4696

    SHA1

    d7da13fb8b2f2aeccd4f9403d90b84232744ffda

    SHA256

    0979194ab79b8ddc473631af130a56d31702e93e1a1be7ba38caa4c22ba817cf

    SHA512

    c3bbe5376c9c80d75921a893aadc807c99d8485901cbbcbd5d6684e0150583e750c43d13271e1edf4fd1df75c1579dc05deb22c8184ba44e2d5fcc5d87a246d2

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    159KB

    MD5

    dddcac61b9c96622b93975b1d21030f7

    SHA1

    ae00a1d5b46f014137b86f7b7f476347ed5e4295

    SHA256

    4a523c2532d1c36c07826a412020753caeb124d8b610690e2b810da6717f25ed

    SHA512

    643cd134acf605d457e921acf4ddaebd66c8270dc3e3154afe32efb9f29663cdbf9014946e58d35f5fd4da6b1e0eba6fc64bb17b6de6a0619cfaa59eb110b4f6

  • memory/2808-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2808-496-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB