Analysis

  • max time kernel
    43s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2022 05:10

General

  • Target

    ca0f111136f5331fab2c390892e8f705389583668917078331d8b8ae1f389401.exe

  • Size

    153KB

  • MD5

    6b1fb05d5b40230e2e70b73ebbc126c9

  • SHA1

    7850ca91ffc37ac32988734cec2a5c403fd56157

  • SHA256

    ca0f111136f5331fab2c390892e8f705389583668917078331d8b8ae1f389401

  • SHA512

    deb33ccadb98ed18f7c39518049e1fb5dd8415636d67372072dcf72192379cf50ff0a7450b823c6535f1cddf2c0571f91ae94955dd5fd23238845385814b77b3

  • SSDEEP

    3072:aOLwcn3j/z/xWikNE9qzelRj7f/+tf6ga1E35gDeSyOITfQ6c5Jq5BiYmlSNz:aOLwcn3rzVP7j7f/03OEJ+eSyZTJc5Yl

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ca0f111136f5331fab2c390892e8f705389583668917078331d8b8ae1f389401.exe
    "C:\Users\Admin\AppData\Local\Temp\ca0f111136f5331fab2c390892e8f705389583668917078331d8b8ae1f389401.exe"
    1⤵
    • Modifies registry class
    PID:752

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/752-54-0x0000000075D01000-0x0000000075D03000-memory.dmp

    Filesize

    8KB

  • memory/752-55-0x0000000001000000-0x000000000104F000-memory.dmp

    Filesize

    316KB

  • memory/752-56-0x00000000748D1000-0x00000000748D3000-memory.dmp

    Filesize

    8KB

  • memory/752-57-0x0000000001000000-0x000000000104F000-memory.dmp

    Filesize

    316KB