Analysis

  • max time kernel
    8s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    10-11-2020 07:01

General

  • Target

    6b02cdf76615948ba7555c66130fc759c0c5d6148673c0e6c59dc945553489ae.exe

  • Size

    4.7MB

  • MD5

    5a0b60ce0d6463557f4553b476e0bde4

  • SHA1

    e3f62e6bc1fd2653ecea2c17d94b672bf99bea89

  • SHA256

    6b02cdf76615948ba7555c66130fc759c0c5d6148673c0e6c59dc945553489ae

  • SHA512

    98dddabd27af62028738a97575602067b6d0d2f31af116d1fbfe9a6149a5ab493a3ddf15eee4cb4a699a8dc3d9961fc003523ce930f76d9476bdaf7f0a59bd1b

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6b02cdf76615948ba7555c66130fc759c0c5d6148673c0e6c59dc945553489ae.exe
    "C:\Users\Admin\AppData\Local\Temp\6b02cdf76615948ba7555c66130fc759c0c5d6148673c0e6c59dc945553489ae.exe"
    1⤵
    • Modifies system certificate store
    PID:1924

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1924-0-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/1924-1-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/1924-2-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/1924-3-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB