Analysis

  • max time kernel
    134s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    10-11-2020 07:28

General

  • Target

    b3ae4a3e568974d58f81cfd8ec7d56fce686bfb3160737044158d291882cac2e.exe

  • Size

    4.9MB

  • MD5

    2be5e71154fef30ca0e9198bc0db6251

  • SHA1

    8e7e5cb3784e6c5cb4682427bf2b249b31dde89a

  • SHA256

    b3ae4a3e568974d58f81cfd8ec7d56fce686bfb3160737044158d291882cac2e

  • SHA512

    6b499dc5fd16c9b318d23442dbe898078bf103ee87865d240d2b6d337ff1335dcf4b25344ff4702e072361b089576875705e898b3ae1eb84df9f187a6692ee90

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b3ae4a3e568974d58f81cfd8ec7d56fce686bfb3160737044158d291882cac2e.exe
    "C:\Users\Admin\AppData\Local\Temp\b3ae4a3e568974d58f81cfd8ec7d56fce686bfb3160737044158d291882cac2e.exe"
    1⤵
    • Modifies system certificate store
    PID:1940

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1940-0-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/1940-1-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/1940-2-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/1940-3-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB