Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 04:19

General

  • Target

    ed4cb53672d795e902de707430430f4ee4cc602e75631bb63490b35c9a061b73.exe

  • Size

    69KB

  • MD5

    fa7f0b0d9a3ecdfc7f7f998dc2b73fe9

  • SHA1

    31c18d471ec139582514e75f9ed805ebbdfb9e76

  • SHA256

    ed4cb53672d795e902de707430430f4ee4cc602e75631bb63490b35c9a061b73

  • SHA512

    2048c1d1eeefa25f337fd3ab57477337130ee0e823a21897f8f32c08cb163715edaf646f6b859e4c3b411e52d1823d4a6487f3d9d13af56f5b3aad5c12c9ace3

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwABT37CPKKdJJxdPO9Ot6K/K2Z2:V7Zf/FAxTWoJJ0TW7JJQOEK/K3

Score
9/10

Malware Config

Signatures

  • Renames multiple (3465) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed4cb53672d795e902de707430430f4ee4cc602e75631bb63490b35c9a061b73.exe
    "C:\Users\Admin\AppData\Local\Temp\ed4cb53672d795e902de707430430f4ee4cc602e75631bb63490b35c9a061b73.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2436

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2737914667-933161113-3798636211-1000\desktop.ini.tmp
    Filesize

    69KB

    MD5

    28a8074811d70735d44bc9a79ff13f74

    SHA1

    07a5f1bd5e516de4972631d3e773a7d44e5844fa

    SHA256

    1eba90f610c4303c81ab38aa187f044611a6877318e27fb7563cf4576918f86c

    SHA512

    612c25195f27ee46b531ef3f65a3b486203a24a31cc236f5c1b557dbf85d8777bc8d1158f5bd41c9a6274f1ec03b3d320f7731b2d8c2142bbc30ce06d0570a64

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    78KB

    MD5

    fd0822a932668f3a3b41664f19b8b3a1

    SHA1

    898ade17d04c604b66779c4e13bb07e4cc1abd5f

    SHA256

    9117846fa8391c7400c0bfd2d28b87be92f53f8e8cac491a8f7c0f8924f93609

    SHA512

    bbad6d6e069276260e980935ae2cb62386c10bf21a216d2fd9cc6d53cb75722a76fbca739e95ecb5af22dcd1816d30fa2d0faf2007f8dc98ffbc9a7e36e9db51

  • memory/2436-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2436-654-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB