Analysis

  • max time kernel
    42s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2022, 20:24

General

  • Target

    45742ce88f3ad66b5d3fbd2dd16fc87a0c7ceac90f603660d4e755bc442a1a20.exe

  • Size

    84KB

  • MD5

    54ebc886b1756a10db5ade4037877ca0

  • SHA1

    f66e2df1fb36a0bc6792de6ae6f99e44ec656cfd

  • SHA256

    45742ce88f3ad66b5d3fbd2dd16fc87a0c7ceac90f603660d4e755bc442a1a20

  • SHA512

    d4549add2794f4906505aab6ade68f96ef00a5d6cdfbf2700e88a6c8b651601240629f3f6976e783ccc06e4b488b87e7fd0d4333756fb923d3b2b3fad78faad7

  • SSDEEP

    1536:MHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6XJJzVt/2YRmA7hGRIULTxkOPB:MHoLde/OgV432UcP39hXJZn/UEjUxkM

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\45742ce88f3ad66b5d3fbd2dd16fc87a0c7ceac90f603660d4e755bc442a1a20.exe
    "C:\Users\Admin\AppData\Local\Temp\45742ce88f3ad66b5d3fbd2dd16fc87a0c7ceac90f603660d4e755bc442a1a20.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:1972

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1972-55-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1972-54-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1972-56-0x0000000000220000-0x0000000000224000-memory.dmp

    Filesize

    16KB

  • memory/1972-57-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1972-58-0x0000000000220000-0x0000000000224000-memory.dmp

    Filesize

    16KB