Analysis

  • max time kernel
    150s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    22-07-2024 20:50

General

  • Target

    43b77ea68320ab9e23a9b2177a2634ff6ce25405daa12e0fd9510d8381ecd563.exe

  • Size

    28KB

  • MD5

    0ceafe42bd0be1ff5005426e0b543195

  • SHA1

    f569c77ba870f41586ecd37918507f302c6a213c

  • SHA256

    43b77ea68320ab9e23a9b2177a2634ff6ce25405daa12e0fd9510d8381ecd563

  • SHA512

    f7a6d2f12d99ecc69358e83302a6ade7f6baef9cd7d80328c3fcef74327c49fc583e9128ec335ab388b764bc8f1ad7eb4bf23a8cbc4f406f6ce2f483783209d3

  • SSDEEP

    768:kBT37CPKKdJJBZBZyF/MF/orMalYJ/ig/is:CTW7JJB7i2JalYpb9

Score
9/10

Malware Config

Signatures

  • Renames multiple (3469) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\43b77ea68320ab9e23a9b2177a2634ff6ce25405daa12e0fd9510d8381ecd563.exe
    "C:\Users\Admin\AppData\Local\Temp\43b77ea68320ab9e23a9b2177a2634ff6ce25405daa12e0fd9510d8381ecd563.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2024

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    28KB

    MD5

    223057bbbd5beab9849df90b58cfaead

    SHA1

    81c7ea6e5d22738220c8bdfff7777e0586b094dc

    SHA256

    0d95a686571ba52c72b0f5fc2931a125ff15f10efd4be9c7a42e4a002981c13b

    SHA512

    c093eeac7a13ee02e46c5ed07693723e58c933069b25e6b606911fd3638539d5b0932bc9e775cba0a5f4902cec4facfd070172e66f5b6cc89afd09e62405f618

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    37KB

    MD5

    9210aa6dad61ff55a372474e48d56ef0

    SHA1

    1288010ea84f0a61ae0dde638b7a9a6c10504402

    SHA256

    288eb5dbb14e291479dc16966ec226adfcf92d2e7889140d30effa0c98c83016

    SHA512

    2f40219ea51c08768654f4a2db2e9e967c22286445e3d2da1aa90ceed98b3dcc68ed652ce08628495740fbe9d455dc6deba21cb26cd581af1bf69f557a221f1c

  • memory/2024-3-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB