Analysis

  • max time kernel
    20s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2022 19:59

General

  • Target

    e3fc92664b150f0bdfb406cd110689d16699bfacc9ebaff4716daefae0b41a0b.exe

  • Size

    84KB

  • MD5

    515b3520ffec32470fff94a448444ac0

  • SHA1

    6ac95e294ef522e909bdfb9640e39e9add9c741c

  • SHA256

    e3fc92664b150f0bdfb406cd110689d16699bfacc9ebaff4716daefae0b41a0b

  • SHA512

    fa058a37cb0e5a51ed99bf0807a8d1a1097f57f2283ae11f87400c9d2b2c42eb6497a044c7145814ce907654680d59178ac6c7d1a49b6509eed4fe3983d460ff

  • SSDEEP

    1536:MHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6XJJzVt/2YRmA7hGRIULTxkOPf:MHoLde/OgV432UcP39hXJZn/UEjUxkk

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e3fc92664b150f0bdfb406cd110689d16699bfacc9ebaff4716daefae0b41a0b.exe
    "C:\Users\Admin\AppData\Local\Temp\e3fc92664b150f0bdfb406cd110689d16699bfacc9ebaff4716daefae0b41a0b.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:904

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/904-54-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/904-55-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/904-56-0x0000000000220000-0x0000000000224000-memory.dmp

    Filesize

    16KB