Analysis

  • max time kernel
    150s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22-07-2024 20:56

General

  • Target

    45f3aa645b9b0d8ec4da494383804c5308db65e80ae255c860c3349935ea87c7.exe

  • Size

    49KB

  • MD5

    c701fc223aad55f6eb6b3ffe260f8a86

  • SHA1

    51db080db3fb9187e2588dba0ace0bf4e6f7379e

  • SHA256

    45f3aa645b9b0d8ec4da494383804c5308db65e80ae255c860c3349935ea87c7

  • SHA512

    e3705d8820b896c0e7ed93585cb25762feb6f90dfc0fc75f4c7f2df130faca70f3f71e156511f7d9f2bd8d869f80251a3dc0d5f6ac1c36c10023047e5ac67607

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFzK:CTWn1++PJHJXA/OsIZfzc3/Q8zxg

Score
9/10

Malware Config

Signatures

  • Renames multiple (487) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\45f3aa645b9b0d8ec4da494383804c5308db65e80ae255c860c3349935ea87c7.exe
    "C:\Users\Admin\AppData\Local\Temp\45f3aa645b9b0d8ec4da494383804c5308db65e80ae255c860c3349935ea87c7.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1684

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

    Filesize

    49KB

    MD5

    365810ab6ea1c2a8faa2d01d2ce9d007

    SHA1

    a1a777a9356c789467d80882aef1b807b8b7787f

    SHA256

    d01259614d2927a908fae9f6fb9ecdeb63cb90516ff29bf0ae6dc82f75303717

    SHA512

    148638f2edcfdf2798d1dcffe8ba8019592791d7e50bbaaec2e72834e7ebc89349b7e902ecef317ee3e8099ed11161a6e294c1ad9220d8679cd223e142a4fb8b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    58KB

    MD5

    dabf27e32dcca5a7a6a3360902d7ed39

    SHA1

    29d3c6a1b736a8e606c5386b4bfb9c1cf5335e1e

    SHA256

    8adbb16c11e3c66661af5e0ae271da1d3a85904453eb2a54091c2f63eea96861

    SHA512

    3e5d1f3bd99ce34c94448f30506af15d2bd2f6abd1697e050bff794a42376bab0afbd11bce0b48038348add142290bd5c3ed4bd1726a097147d4ce0a7e04d627

  • memory/1684-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1684-18-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB