Analysis

  • max time kernel
    41s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2022, 19:31

General

  • Target

    20fbda5239a6d096191510fdc42ed25406088a6e0f2b33fc48f4e51d3daaddda.exe

  • Size

    4.0MB

  • MD5

    65b220e862ed1d275efb9562866c4c44

  • SHA1

    45684bb0a95db0abf03004f66c835b05dbf77fd2

  • SHA256

    20fbda5239a6d096191510fdc42ed25406088a6e0f2b33fc48f4e51d3daaddda

  • SHA512

    f198506e7c380d8fe25231a1f857ca1d1919f5bea97e6e41d46ff249c37304292854f2d9797d6fd493a736f9f26bbd700267d9f263c9508672bb023967316902

  • SSDEEP

    98304:Gdktdnfnwp3oOLuB/3/um1UCwW7MkdynA+0sfY:/tdn/izLsum2CFwSynT0r

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\20fbda5239a6d096191510fdc42ed25406088a6e0f2b33fc48f4e51d3daaddda.exe
    "C:\Users\Admin\AppData\Local\Temp\20fbda5239a6d096191510fdc42ed25406088a6e0f2b33fc48f4e51d3daaddda.exe"
    1⤵
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    PID:1660

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1660-54-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB