Analysis

  • max time kernel
    60s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 03:02

General

  • Target

    d1757ba7eda0334e7823a9cb8c7b469972978f6db7cc95887b28d8f4ee984609.exe

  • Size

    69KB

  • MD5

    7265a8571623e538563212b06d4aefea

  • SHA1

    c655b97f2461b931b3f4b10421c42fa1749c1ed3

  • SHA256

    d1757ba7eda0334e7823a9cb8c7b469972978f6db7cc95887b28d8f4ee984609

  • SHA512

    4de964d224979ddaf2d6e5d6356ec91133f43902971200461b19d300b399f7e723e4e1567979a41f142b3cf2148a6e926af14b19a6fb51a0bdf2c7296d83ebe6

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxc:fnyiQSoF

Score
9/10

Malware Config

Signatures

  • Renames multiple (197) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d1757ba7eda0334e7823a9cb8c7b469972978f6db7cc95887b28d8f4ee984609.exe
    "C:\Users\Admin\AppData\Local\Temp\d1757ba7eda0334e7823a9cb8c7b469972978f6db7cc95887b28d8f4ee984609.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2240

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-39690363-730359138-1046745555-1000\desktop.ini.tmp
    Filesize

    69KB

    MD5

    7fd1caf84c60d607838bc77a4e12718c

    SHA1

    f04e3ec70e73f0b1b3a15486c4ba40bd20bf81f4

    SHA256

    a134943e297b74320df5a278e7eb3b306ebcf27778c2702ca83295471a7b6202

    SHA512

    7dd22bbf22213086c960abbfe53f0922f3d8b4024ac427bff84f6ed0fc1d88a5012924810033112565c02c30354e2000ea1c6e2dc8ce7f9db68b29480b9c34aa

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    78KB

    MD5

    272369deefb13d8f5e1f636f4320d772

    SHA1

    680df242de800c086c15cd6bd463abce3cd54a89

    SHA256

    bbefe7a012e404e003b9a2b445e95729dbc0604f45ece44f5038ee6fbbd57a8b

    SHA512

    42724ab4ecf9b60db7d4c6806171db2d0dbb22e7b06eec9e686e4742944ca0e44f247f1df73d8b3ac344a3e6c518df0d589bb8bdfe313a36fa8d69552e18a943

  • memory/2240-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2240-58-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB