Analysis

  • max time kernel
    151s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2022 19:46

General

  • Target

    3b8eec2745a6060f0c1ac933fe1e9da6ba3aef1fcc91b75e1d2c14e7992b3101.exe

  • Size

    128KB

  • MD5

    69e1199ee9c4604d7b3642fb8f1d5840

  • SHA1

    4837b2a0cc87fd373825b48ccb1bf6428069c86f

  • SHA256

    3b8eec2745a6060f0c1ac933fe1e9da6ba3aef1fcc91b75e1d2c14e7992b3101

  • SHA512

    58c0d1cb226143282d0201e75b92797ccd23a6596f92c159df2066ceb29bd3e1e496bb460f537214a53e19ed832a2a9de875807d43fb266460b0f8ba1966ef3e

  • SSDEEP

    1536:aNFayQfAgR18TNqY/x0xNS6MD20XMkKoToJJrJJJWr6JrJk53EEt1l+lu9uU7zz6:Nt/kUY5MSxD20XM1orb7t8hbwZOX

Score
8/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b8eec2745a6060f0c1ac933fe1e9da6ba3aef1fcc91b75e1d2c14e7992b3101.exe
    "C:\Users\Admin\AppData\Local\Temp\3b8eec2745a6060f0c1ac933fe1e9da6ba3aef1fcc91b75e1d2c14e7992b3101.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1872
    • C:\Users\Admin\AppData\Local\Temp\001\svchost.exe
      "C:\Users\Admin\AppData\Local\Temp\001\svchost.exe"
      2⤵
      • Executes dropped EXE
      PID:1992

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\001\svchost.exe

    Filesize

    28KB

    MD5

    12f1c087ebf311a01b772513a3fc8837

    SHA1

    012e83a3423113009afccd460b0d8fe8d7914640

    SHA256

    6d8b56a33cf38949bc7d50cc2e7ab390237794c642b4c38b43b193909a40b4bf

    SHA512

    3ad3b3225db7bcc744b22a39288e83f735ff9518aeb60872bbcce3a4889044ab2e770ca9678937ce4580a1f5ca2ddcd22f8910b8e4ece59ea4331d4123782607

  • \Users\Admin\AppData\Local\Temp\001\svchost.exe

    Filesize

    28KB

    MD5

    12f1c087ebf311a01b772513a3fc8837

    SHA1

    012e83a3423113009afccd460b0d8fe8d7914640

    SHA256

    6d8b56a33cf38949bc7d50cc2e7ab390237794c642b4c38b43b193909a40b4bf

    SHA512

    3ad3b3225db7bcc744b22a39288e83f735ff9518aeb60872bbcce3a4889044ab2e770ca9678937ce4580a1f5ca2ddcd22f8910b8e4ece59ea4331d4123782607

  • \Users\Admin\AppData\Local\Temp\001\svchost.exe

    Filesize

    28KB

    MD5

    12f1c087ebf311a01b772513a3fc8837

    SHA1

    012e83a3423113009afccd460b0d8fe8d7914640

    SHA256

    6d8b56a33cf38949bc7d50cc2e7ab390237794c642b4c38b43b193909a40b4bf

    SHA512

    3ad3b3225db7bcc744b22a39288e83f735ff9518aeb60872bbcce3a4889044ab2e770ca9678937ce4580a1f5ca2ddcd22f8910b8e4ece59ea4331d4123782607

  • memory/1872-58-0x00000000003B0000-0x00000000003C3000-memory.dmp

    Filesize

    76KB

  • memory/1872-59-0x00000000003B0000-0x00000000003C3000-memory.dmp

    Filesize

    76KB

  • memory/1872-61-0x00000000003B0000-0x00000000003C3000-memory.dmp

    Filesize

    76KB

  • memory/1992-60-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/1992-62-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB