Analysis

  • max time kernel
    152s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2022, 23:47

General

  • Target

    140c9f17cedce74a135bf258c302b4f0358e8bb4f7041d6ae358201af4daf1cc.exe

  • Size

    82KB

  • MD5

    6658b412479dfd1815c3af57270a44c7

  • SHA1

    0030ccb5d42aade75f512cd16b9f61e684e157f8

  • SHA256

    140c9f17cedce74a135bf258c302b4f0358e8bb4f7041d6ae358201af4daf1cc

  • SHA512

    fb5516251d8512b6d8fe52999d681976e9b1a973af142eb1671ddda0e3bbf5579364bb0ba2f4098ced4ae1b317699cb34ab560993173cdef92529726ded1742a

  • SSDEEP

    1536:5lrsicagdzn8K2ariPOcjk+XQuPVN72NMSo9pL0BicS4F+OuS+:5JjcF8KfCOcjk+guPVjScpgBimFi5

Score
8/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\140c9f17cedce74a135bf258c302b4f0358e8bb4f7041d6ae358201af4daf1cc.exe
    "C:\Users\Admin\AppData\Local\Temp\140c9f17cedce74a135bf258c302b4f0358e8bb4f7041d6ae358201af4daf1cc.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    PID:2132

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2132-132-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/2132-133-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB