Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23-07-2024 02:35

General

  • Target

    c5e8ddbfa495d81ce527059b362cf19f8d82d05a3321e0fd3866477ec6a6090c.exe

  • Size

    70KB

  • MD5

    cca8155dbbb7495dd5e3af2684901a94

  • SHA1

    9c2779494336ee14ee60638cc9b93d9bc65cb115

  • SHA256

    c5e8ddbfa495d81ce527059b362cf19f8d82d05a3321e0fd3866477ec6a6090c

  • SHA512

    b4d127c008cb215145b8df1debb7d90cada5498ef410160082da6afc0dfbd91ab0a893758d8d314bb1eac3063ba78a361ab8cc424b4616f6e033bb23f187481d

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJXGiXZBI1qCpS8v8wlkfwFTFc1NsHpwsr:V7Zf/FAxTWoJJX0rv7cL4Ssr

Score
9/10

Malware Config

Signatures

  • Renames multiple (3455) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c5e8ddbfa495d81ce527059b362cf19f8d82d05a3321e0fd3866477ec6a6090c.exe
    "C:\Users\Admin\AppData\Local\Temp\c5e8ddbfa495d81ce527059b362cf19f8d82d05a3321e0fd3866477ec6a6090c.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2056

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

    Filesize

    70KB

    MD5

    5922cf703de8eb0b5bc9f60d7e175e7a

    SHA1

    56971a76fb11dfb864ce351ad36761eb17b2f42f

    SHA256

    bced603baaeb8aba4b57095f586e313e25ed5b5cb89c3e870d0bf3ce6c0e730c

    SHA512

    4e835cd8241fc66718626a7407066027f05d5f20486620586f761fecb46fbb463d5f5ac4887e642ab68ac9d00aea11d258dbe8406c4f82088ca98dc1cc83d94c

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    79KB

    MD5

    6c67c447b4d6e9e167c4979411e9b077

    SHA1

    5a7a4eda42cd67a11ba9a4be210b3aa93567acc6

    SHA256

    2e3294f83acf40f28e0a14821efc701d6bf105ecb50cecc25c2d42dfeefa1a07

    SHA512

    db71da44d2e34c7177bb61192fba3049559b5a862a5cd1fa0fdf5b252e337649132e27ae8837106e7543a37346734afb65410b25fabb50a10b10358293077fbf

  • memory/2056-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2056-446-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB