Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2022, 02:04

General

  • Target

    9cce5c97820fa836bc8c6df73e2db72ad103d5d45dcd5a4caa8643dd52980c79.exe

  • Size

    33KB

  • MD5

    7ca148127d7b96f392159d3749e43d20

  • SHA1

    0cd8f69ec01b1f79a22fdd8632ed6fae94913ff6

  • SHA256

    9cce5c97820fa836bc8c6df73e2db72ad103d5d45dcd5a4caa8643dd52980c79

  • SHA512

    be86275aef85a53e13d7bb35c4ddc3146458955f9268cfc3b63c4a152abe1b030b769437acc8cd7f78c33b759065e4fa32c93b4cf72023ec1b9fd8e0893f58a2

  • SSDEEP

    768:SCIqdH/k1ZVcT194jp4aTdc45TGZhyzn7/C2j16wI:SNqaLV8a6+ciIk/FAwI

Score
8/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9cce5c97820fa836bc8c6df73e2db72ad103d5d45dcd5a4caa8643dd52980c79.exe
    "C:\Users\Admin\AppData\Local\Temp\9cce5c97820fa836bc8c6df73e2db72ad103d5d45dcd5a4caa8643dd52980c79.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Drops file in Windows directory
    PID:1240

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1240-132-0x0000000000800000-0x000000000080D000-memory.dmp

          Filesize

          52KB

        • memory/1240-133-0x0000000000800000-0x000000000080D000-memory.dmp

          Filesize

          52KB