Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    23-07-2024 03:22

General

  • Target

    d6c1996da395665015fc340da1997598495fa28e273285a37a745b53f5dbcf17.exe

  • Size

    58KB

  • MD5

    8e8a20b51932c5ee2815e84a5187d57b

  • SHA1

    04b56045c184e0976710fe76fa35dcc9363c1c8a

  • SHA256

    d6c1996da395665015fc340da1997598495fa28e273285a37a745b53f5dbcf17

  • SHA512

    0e2bd3c400cf03d7a263e11641f2e7832dab73124244c389b20e60f5bb8207e55e939ccce4f56a1e4d5539961eaf63c1178c71c327dc2ed19c2431049f147d08

  • SSDEEP

    1536:V7Zf/FAxTWoJJ7TTKP2awclvmxaKP2awclvmxi:fny1aP2awclvmxrP2awclvmxi

Score
9/10

Malware Config

Signatures

  • Renames multiple (3514) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d6c1996da395665015fc340da1997598495fa28e273285a37a745b53f5dbcf17.exe
    "C:\Users\Admin\AppData\Local\Temp\d6c1996da395665015fc340da1997598495fa28e273285a37a745b53f5dbcf17.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2704

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    59KB

    MD5

    fde9472dfa973eb411a23aa18e35f211

    SHA1

    abce30da58b66e8783ee979e31b9f474e5852dbc

    SHA256

    c2c1ff1e5285ba6467f84a06aaeaaec0f9316ffb158978a5c412fcc71dd8aec4

    SHA512

    6cd83bb805ace1601b2b9df2def399b9eaba5158437ec1a54a8ebf8525e7bb7cad7ae83cb632d01dd123fb4613166722501bb3582ab45d6397487da7a3982e5b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    68KB

    MD5

    f6f36ccf98720105644076a382316872

    SHA1

    d84d6e34099e2636afc9adea5269ebd8b1bb5363

    SHA256

    b772151245a03fe61a3fb973f6c5b2a7a009e5364321fe8dee567c0bc9f829e1

    SHA512

    2b0bdd67e236c0acc5636e57d779a97466aadf6ff25c82858ba005b496bc8c0ce7f92a3c3eca2e8ecb2f8e82a202ce7dfffd5d8b5378fe0ad321df01de36123f

  • memory/2704-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2704-648-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB