Analysis

  • max time kernel
    37s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2022, 05:36

General

  • Target

    67437a0b8f49d23342a0e28f964fce5f4792e1c750b480006c52678a0dbe1e63.exe

  • Size

    62KB

  • MD5

    5964ba830aca17bd3fd539dd77a51830

  • SHA1

    4b073cdd16046ac8cf866747edb5cfdd8768ad7c

  • SHA256

    67437a0b8f49d23342a0e28f964fce5f4792e1c750b480006c52678a0dbe1e63

  • SHA512

    43ef0443d6c88e5f02edc8a8ce5a47a7da407540d9069c56405810d7c7aabe0f8f0bf4fc935af0b20472b6a1bc345f0e9dfd69b55fd6dfc313f7f95c0e58c47c

  • SSDEEP

    1536:MHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6XJJzVt/2b:MHoLde/OgV432UcP39hXJZn/U

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\67437a0b8f49d23342a0e28f964fce5f4792e1c750b480006c52678a0dbe1e63.exe
    "C:\Users\Admin\AppData\Local\Temp\67437a0b8f49d23342a0e28f964fce5f4792e1c750b480006c52678a0dbe1e63.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:1612

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1612-54-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1612-55-0x0000000000220000-0x0000000000224000-memory.dmp

    Filesize

    16KB

  • memory/1612-56-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1612-57-0x0000000000220000-0x0000000000224000-memory.dmp

    Filesize

    16KB