Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 04:42

General

  • Target

    f672cb38d2ce432c8ddc2ac281ed158c838465da3427902b630ed3f08e8a0323.exe

  • Size

    49KB

  • MD5

    42032e6c0a3efedd7dd1f27dc0f2548e

  • SHA1

    80515f64669ab772f5df9ce1b430fb31240adf7f

  • SHA256

    f672cb38d2ce432c8ddc2ac281ed158c838465da3427902b630ed3f08e8a0323

  • SHA512

    cd2550cd5fe4ba3a63ba33c70b137af9bd40a6a735983d1109c34ab1f2f8530e3badd7870842cd7e6fce23262f10285dd95da2df1c1a222a32fb94dec938383f

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJjtf8WUtf8WZCqCb:V7Zf/FAxTWoJJ2WjWZCqCb

Score
9/10

Malware Config

Signatures

  • Renames multiple (3674) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f672cb38d2ce432c8ddc2ac281ed158c838465da3427902b630ed3f08e8a0323.exe
    "C:\Users\Admin\AppData\Local\Temp\f672cb38d2ce432c8ddc2ac281ed158c838465da3427902b630ed3f08e8a0323.exe"
    1⤵
    • Drops file in Program Files directory
    PID:944

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini.tmp
    Filesize

    49KB

    MD5

    755171e90b02285544fcdb61d0f7656c

    SHA1

    d83cf28a2978baf81203b9792c391e67816718c8

    SHA256

    13e755364f2aeba9c73dffdfe641e58ce4e83cf43a3bd98a75e1805f17172ce2

    SHA512

    6aeb6c6b3b2151541c544de5a8f27d6749b61362c714e77634315ebc7b38d455370c2d1cb1fda76fa6aa8f8733a607abbd74de56d3821a218d6a9c0f54c8c9d9

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    58KB

    MD5

    c10dbe5f6f51a5ed6b1fbdd0d82d6aa5

    SHA1

    5ec2ab39381fa05083ecdd2ea1dfb18319b62548

    SHA256

    63f3aacd01d8551cbf9afb4dd9cae1094968baee00f3788367cbc2f51f8690c6

    SHA512

    c2dde92cf24daa7844c2f4258a8d8f1dcd234eeb21928e47ad0f3d806932cd5872b100250e248868784d2725010079bdfe7ad5d60860dc6624e46eb8699abf6d

  • memory/944-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/944-522-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB