Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 04:03

General

  • Target

    e816bf00c7d3937a0fe4a34716de72efbac0bc2c399821daf0dab2076b68eb83.exe

  • Size

    41KB

  • MD5

    660b9a459bbbc9d7fb04c42cca34499f

  • SHA1

    a9243222dbda1d819251d0918de0d95effecba0c

  • SHA256

    e816bf00c7d3937a0fe4a34716de72efbac0bc2c399821daf0dab2076b68eb83

  • SHA512

    72919179da217128d3a8715a670f3a87dfc06478d169fc044f130e42884a3c7aa8e763d0163555a7ed4e0d52af10ebd73b7054eb9e502a5baaf8115a60805371

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJjtf8WUtf8WGoj9COieQJfoj9COieQJo:V7Zf/FAxTWoJJ2WjWpf1fv

Score
9/10

Malware Config

Signatures

  • Renames multiple (3423) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e816bf00c7d3937a0fe4a34716de72efbac0bc2c399821daf0dab2076b68eb83.exe
    "C:\Users\Admin\AppData\Local\Temp\e816bf00c7d3937a0fe4a34716de72efbac0bc2c399821daf0dab2076b68eb83.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1740

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2297530677-1229052932-2803917579-1000\desktop.ini.tmp
    Filesize

    41KB

    MD5

    e1f0da5ab5677173b45bf4d1971eda10

    SHA1

    07371cb12e4c7eab2b8186031780a2abe445c7f7

    SHA256

    605d65187aa4521af259334f5ee83df885e39f2c67f014275ada75c23148bf0f

    SHA512

    e81552ccc9746e55e41b1a5010be26ea7913f0aeb4910a62ebc219b9d5d35abe23aff067b49df73f9b7d12efbd7439d5d0b1688ca6f262e980bc9a4de0622266

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    50KB

    MD5

    02550eccd09c0cbd76bc82992641af16

    SHA1

    0a1c857a33de400efd38445f9c7c2a28c66edf17

    SHA256

    5ff825a9551b9f4e90e7472e9c3d4e21a6e197d4ec008ea29a4d01e591fa67fd

    SHA512

    39ab9a9a53d632d572e70ced88241c0b3f07cb67ba409bf046a221bc9a372503ede402f4822733173b3f37d29bc449eea722a542e4c58633729af3de48b64ac3

  • memory/1740-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/1740-392-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB