Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 04:22

General

  • Target

    ee3bd21b1fcc82c410da9270b56366f7ad52c688b0b7a92a9afbf8eb4d98d035.exe

  • Size

    68KB

  • MD5

    d97379c6d80ba7b679fdebd94bfac7ee

  • SHA1

    6cf8c8e2cfe54aea587b9386367c3493d42a3ae9

  • SHA256

    ee3bd21b1fcc82c410da9270b56366f7ad52c688b0b7a92a9afbf8eb4d98d035

  • SHA512

    d4ef95659c12d3311e056d782ff14b201a661566be01ee5c3d26f5f33e0b914567a4e1b007dcf8a84e8848a082f590022122afa9140e8ed7cef80e742ee1ecf3

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8c:fnyiQSoP

Score
9/10

Malware Config

Signatures

  • Renames multiple (3307) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee3bd21b1fcc82c410da9270b56366f7ad52c688b0b7a92a9afbf8eb4d98d035.exe
    "C:\Users\Admin\AppData\Local\Temp\ee3bd21b1fcc82c410da9270b56366f7ad52c688b0b7a92a9afbf8eb4d98d035.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2080

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-481678230-3773327859-3495911762-1000\desktop.ini.tmp
    Filesize

    68KB

    MD5

    5f1cae92dd7cfa3f2aed2f60fbe1a47b

    SHA1

    14864366905be35c9c1e19bcca827a2e5e30c56e

    SHA256

    c87346c7e78f2d8a1b0925a1ebdcc419aa03b217457462d870a1b3a98ad13795

    SHA512

    66576eb4daa599cdc14e213032fbe99beaa581c50a497ff40991caa7af1a6b79775410706efd4a4072e37b76d474c2c1046146e387e44b56ffa7a0c4256d337a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    77KB

    MD5

    4ce01bf60ba0a53f3bd3a65cea714027

    SHA1

    03249ea5d390df67596a5e73d7382252da3cda2f

    SHA256

    5f182ed54a9496b4cec12f88ccf0c9bb51ccf671e8805107a217ec7f3e49cb89

    SHA512

    bdbcf0378fd9695a7518ebe08f806fd01843ae4312e3a5b129173a95e6b4b6699174606ad6e794e207c94d08fb91d6648052be4ffcb4e54f11a4a2a520100030

  • memory/2080-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2080-294-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB