Analysis

  • max time kernel
    38s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2022, 05:50

General

  • Target

    b41a0282c6b099e7b4ef09f44aebf99c41c53e6fc4824e731dddd556e558666e.exe

  • Size

    199KB

  • MD5

    7c2df5cb3ba9b989d6858bd3332c0cb1

  • SHA1

    e7906381e4146d69e0e35ddaa5ff98787d68370f

  • SHA256

    b41a0282c6b099e7b4ef09f44aebf99c41c53e6fc4824e731dddd556e558666e

  • SHA512

    8c2042112811d8b2b0706230500d0f62e1be23497912959b5255110aa11e27e4c93d3088be8d2a904c97ef64bd63313bb325a71852b9c78509a6f1c8a06cf1b8

  • SSDEEP

    3072:Zejt7H27r2AHnVujS479RlGXOcJRbCVxX1:Zw7H27KAHnUjS47dG+AbSx

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1260
      • C:\Users\Admin\AppData\Local\Temp\b41a0282c6b099e7b4ef09f44aebf99c41c53e6fc4824e731dddd556e558666e.exe
        "C:\Users\Admin\AppData\Local\Temp\b41a0282c6b099e7b4ef09f44aebf99c41c53e6fc4824e731dddd556e558666e.exe"
        2⤵
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:1672

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1260-58-0x00000000029E0000-0x00000000029EC000-memory.dmp

      Filesize

      48KB

    • memory/1260-56-0x00000000029E0000-0x00000000029EC000-memory.dmp

      Filesize

      48KB

    • memory/1672-54-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1672-55-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1672-61-0x0000000000230000-0x000000000024A000-memory.dmp

      Filesize

      104KB

    • memory/1672-60-0x0000000000400000-0x0000000000418000-memory.dmp

      Filesize

      96KB