Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    23-07-2024 02:37

General

  • Target

    c6abc5f694de06a8ab2c3bc1af3d2a94286c6c51094d622126b28a9365b53cb9.exe

  • Size

    61KB

  • MD5

    34642a3485f2acdae125e59a09333da8

  • SHA1

    6e47bdc2481b7027fddd81adc4dc7ad6b301ed8f

  • SHA256

    c6abc5f694de06a8ab2c3bc1af3d2a94286c6c51094d622126b28a9365b53cb9

  • SHA512

    e1ba6388cecbd3896b34fbdc0d0200c522ebced7332934f35ecbc01ea4d4fb795eb1700665e316e351a476505ee23a947943d33f9eb427edd2f442fea98035ee

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTNy+TW7JJZENTNyADR:fny1tE6tEfDR

Score
9/10

Malware Config

Signatures

  • Renames multiple (3217) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6abc5f694de06a8ab2c3bc1af3d2a94286c6c51094d622126b28a9365b53cb9.exe
    "C:\Users\Admin\AppData\Local\Temp\c6abc5f694de06a8ab2c3bc1af3d2a94286c6c51094d622126b28a9365b53cb9.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1604

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    62KB

    MD5

    c765376dafee9f956f9f73dfabf35414

    SHA1

    06ed04211087825cc86621f38d454d46b0b17f48

    SHA256

    c6be7386dce49712356650cf76c246c3901a373c062a07e2687871b6d2bd50f3

    SHA512

    9489d705daee2696b753a561ecf4a228b66ef627514df5b86e34b680a9bee6f05b18dd661ddeb61ee69fe62f0b5b39472f849e9cb2240aad51e221c74a2dada0

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    71KB

    MD5

    5cc18369ac38ba73acf7735c92fc36c2

    SHA1

    01b08a9852ed5cecd12ec4b5d35cfef03ae0460d

    SHA256

    cdd2931aa7bf682bbe536048ac3a1fdfaec92ff51066ab29584e4b5077d25a86

    SHA512

    e6a69f95fec23cf69bde4aba2c2203b26703ad48528642640c825fc30db5752eac2404479c02698bca811048d3d07e97d427c27764ff0dac831f0dfcf5ab70ff

  • memory/1604-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1604-404-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB