Analysis

  • max time kernel
    143s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2022 19:12

General

  • Target

    a7a210a8c2f412ee126d243dc08ca3eeb3b1497c9100e63b6700b8c463b0bd40.exe

  • Size

    170KB

  • MD5

    d58961469b5656947f49d98e9d0d7022

  • SHA1

    562688dfa03f3d0cbda623a3ccde73a201ec992d

  • SHA256

    a7a210a8c2f412ee126d243dc08ca3eeb3b1497c9100e63b6700b8c463b0bd40

  • SHA512

    5c4892e1a12eeb9dd6e84ee17724b1bc7d893d7323dcc8fea7bcfeed73684cc9985608ea899f9f7c2cf60f9e0011c5a5ea9f5c6535e73b259f09b860d0327516

  • SSDEEP

    3072:lmppYQV2jWD1cKwfofgErOB4yKHgobOFUcVAuV9+Zuk2sdT3xAMWAaoutjgO:EbMycfofUBlK/ShhHcLBWAaoS9

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a7a210a8c2f412ee126d243dc08ca3eeb3b1497c9100e63b6700b8c463b0bd40.exe
    "C:\Users\Admin\AppData\Local\Temp\a7a210a8c2f412ee126d243dc08ca3eeb3b1497c9100e63b6700b8c463b0bd40.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4112
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4112 -s 300
      2⤵
      • Program crash
      PID:4680
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4112 -s 300
      2⤵
      • Program crash
      PID:3440
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 4112 -ip 4112
    1⤵
      PID:2252

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4112-132-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/4112-133-0x00000000006A0000-0x00000000006B4000-memory.dmp

      Filesize

      80KB

    • memory/4112-134-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB