Analysis

  • max time kernel
    185s
  • max time network
    190s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2022, 03:06

General

  • Target

    856e7f4049895822a1b05f26ef4a0b850ec9a6782bddc81a654432a4c28ad3cf.exe

  • Size

    25KB

  • MD5

    32342c4f6b6c4b804f06b35cf7616dc1

  • SHA1

    aaa2f9463fc8811c7fc3b70e9f0c306fc6b9a65f

  • SHA256

    856e7f4049895822a1b05f26ef4a0b850ec9a6782bddc81a654432a4c28ad3cf

  • SHA512

    d56f7dc4bdbad2c013aafd071efe5a61e5bd206039dd291431e3c023f2cf5c5d2d21e019c6896a1fe22ee0af5f315183ddd4beed88207c8926b53ff6603ed59b

  • SSDEEP

    384:FZcpzCIqdG3A3WUkx38GZDJuJbf1+o44u8gHzUrpdtO0xPtVx:SCIqdH/k1ZVcT194jp41dM0PVx

Score
8/10

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 26 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\856e7f4049895822a1b05f26ef4a0b850ec9a6782bddc81a654432a4c28ad3cf.exe
    "C:\Users\Admin\AppData\Local\Temp\856e7f4049895822a1b05f26ef4a0b850ec9a6782bddc81a654432a4c28ad3cf.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Drops file in Windows directory
    PID:1396

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1396-54-0x0000000075141000-0x0000000075143000-memory.dmp

          Filesize

          8KB

        • memory/1396-55-0x0000000000800000-0x000000000080D000-memory.dmp

          Filesize

          52KB