Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 05:02

General

  • Target

    ffafc4c110ebb0a732919e7c328ebe208a700487d1d3ef229fda499c150bdc44.exe

  • Size

    46KB

  • MD5

    8ff30e0e2eeb28932789ada57c96bab3

  • SHA1

    364fc532ac06f389f1aebbee598373c0563da735

  • SHA256

    ffafc4c110ebb0a732919e7c328ebe208a700487d1d3ef229fda499c150bdc44

  • SHA512

    b47372b712be43d16c1995e09c26f101b1b97b1b48e24b1d1e8a13b6188ccfcbd7fc6120487e8329a9ad44396a080e974bc2c1d6c25a787748248c8a37ded371

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFz+:CTWn1++PJHJXA/OsIZfzc3/Q8zx4

Score
9/10

Malware Config

Signatures

  • Renames multiple (3455) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ffafc4c110ebb0a732919e7c328ebe208a700487d1d3ef229fda499c150bdc44.exe
    "C:\Users\Admin\AppData\Local\Temp\ffafc4c110ebb0a732919e7c328ebe208a700487d1d3ef229fda499c150bdc44.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2344

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2812790648-3157963462-487717889-1000\desktop.ini.tmp
    Filesize

    46KB

    MD5

    46dd9e2bd3269102ce84f0440e9c50bf

    SHA1

    3d387743847ece0d9285ee8e96931544716a86dd

    SHA256

    3826c66fe025a7f366f0802ab742cb973cefa3f8eaacbfeba03ea88b397cb742

    SHA512

    002a2434c3822077549d486ed5ba1c3c1345f0be3af78c41ceb99493f0bf86e56ec245c774bdb3c69ad42763427d53d5ed884224038f7b078a3402ad91534f6c

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    55KB

    MD5

    14b8e3045600a321d4073bcee78625b0

    SHA1

    c6173a5e2395c4d03b27d44c9e720efce706a99a

    SHA256

    d324c4b16b178f6faacffbdee23e4e22ee80a458f8d2cb3362f7c551f592df14

    SHA512

    352a1c1c75505fd1c7a2042c2cada26734a0d91c1a30a069e7e8e0ccce1d9545ee563b2fbed210a8e07ceef133699432c9a5a665033e8045dba66f363588c4df

  • memory/2344-0-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2344-74-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB