Analysis

  • max time kernel
    42s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2022, 08:39

General

  • Target

    22991e19d62d782926bded98fda4f4e1dc9338b7fea04a0b862ccafd66a97c70.exe

  • Size

    142KB

  • MD5

    7a6dcc8d68a1df0f550969418334e870

  • SHA1

    3b33ae01ca0b8113ae5e8c91a4b27747a1c0bf05

  • SHA256

    22991e19d62d782926bded98fda4f4e1dc9338b7fea04a0b862ccafd66a97c70

  • SHA512

    aeb3385e2001b386833b83494f20ac8043a584ff6799a56744311890877739cebf95f759311592c279ddda10803de6a0f4a859d92f3d90ba059e914ca7449edd

  • SSDEEP

    3072:Ocrt0ccgNcPgNAbOKG/Upl1Nl/gQm0BQPC735PgRO/YqL:OcrWlGsgKblR3gB4QPo5I8Yq

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\22991e19d62d782926bded98fda4f4e1dc9338b7fea04a0b862ccafd66a97c70.exe
    "C:\Users\Admin\AppData\Local\Temp\22991e19d62d782926bded98fda4f4e1dc9338b7fea04a0b862ccafd66a97c70.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:532
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      2⤵
        PID:2020

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/532-54-0x0000000075091000-0x0000000075093000-memory.dmp

            Filesize

            8KB

          • memory/532-55-0x0000000074110000-0x00000000746BB000-memory.dmp

            Filesize

            5.7MB

          • memory/532-61-0x0000000000635000-0x0000000000646000-memory.dmp

            Filesize

            68KB

          • memory/532-63-0x0000000074110000-0x00000000746BB000-memory.dmp

            Filesize

            5.7MB

          • memory/532-64-0x0000000000635000-0x0000000000646000-memory.dmp

            Filesize

            68KB

          • memory/2020-59-0x0000000010000000-0x000000001004D000-memory.dmp

            Filesize

            308KB

          • memory/2020-57-0x0000000010000000-0x000000001004D000-memory.dmp

            Filesize

            308KB

          • memory/2020-56-0x0000000010000000-0x000000001004D000-memory.dmp

            Filesize

            308KB

          • memory/2020-60-0x0000000010000000-0x000000001004D000-memory.dmp

            Filesize

            308KB