Analysis

  • max time kernel
    118s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 02:53

General

  • Target

    ce517cbcf5bee6237f761e4f0ea936b23bf046acb3ef477acace294d3fd9a8a8.exe

  • Size

    58KB

  • MD5

    89bea892c8e4f1cbf97eb48e5c1eba28

  • SHA1

    3e9ca8d5f4ff492b6e6a90fc94bfdcc6eaf62c73

  • SHA256

    ce517cbcf5bee6237f761e4f0ea936b23bf046acb3ef477acace294d3fd9a8a8

  • SHA512

    6e3c92134e9f991c2ad9586c29ed567e8c8ac942a931a9b07bac820eb76c6e882e67de8f1fdc198a00ab9b3d672c2d722f16c0b7e0d198d0e16d46bde24556a2

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8zxcJ+cJ+j:KQSoa

Score
9/10

Malware Config

Signatures

  • Renames multiple (1032) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce517cbcf5bee6237f761e4f0ea936b23bf046acb3ef477acace294d3fd9a8a8.exe
    "C:\Users\Admin\AppData\Local\Temp\ce517cbcf5bee6237f761e4f0ea936b23bf046acb3ef477acace294d3fd9a8a8.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2108

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2812790648-3157963462-487717889-1000\desktop.ini.tmp
    Filesize

    58KB

    MD5

    3dd6b70dd19b151ea7abeaff1b1dfcba

    SHA1

    7aa883382cea0ce0f5f4e5f096ef975e12b59f34

    SHA256

    f563856c576ca3f758b233512cd13f0e8088a075d92fbe28b369c57dec6eae04

    SHA512

    3dad932ec0849300c0a4bc478cc9995959998fbcf174e8702f58557de96f4f5e287b61f1db5ba4e9657921196af5245e3bfe1bcd78fa40d6ee17a126e6711ba7

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    67KB

    MD5

    89c90917d3368d2b627631649a40f8c7

    SHA1

    26d5e2fa76e1d0f47eb9560042aafc055588c583

    SHA256

    5dc6248b3afc8686aea3df2ada4f142d085c59006303d845ca5e298328acf958

    SHA512

    a579c2c2ca45ecf0a79a046c1a13f1838e5d3b4658a263c732aeb6c74844fa25535a95d19d800ba54f887b603365f6c33f294ec296a15259a5e9229133cb7118

  • memory/2108-0-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2108-50-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB