Analysis

  • max time kernel
    141s
  • max time network
    180s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/10/2022, 19:01

General

  • Target

    a21949ec73c637a3469bafd53dcaf3d1f942b082c856df58d53cc9289fb851f6.exe

  • Size

    71KB

  • MD5

    a0adc0aacdfede89dd753de4159d7e90

  • SHA1

    9dfb01caf3b358cd200dd226cb1991df31865bac

  • SHA256

    a21949ec73c637a3469bafd53dcaf3d1f942b082c856df58d53cc9289fb851f6

  • SHA512

    5caf702fec5675f356b0bcab90703f72f99343b954f5940e3dee4c1b2f097271ccdb3536e06fb9794e22416ce9a8138d775486f7b6d3236e51154f09cf7fa491

  • SSDEEP

    1536:5lrsicagdzn8K2ariPOcjk+XQuPVN72NMSfOk:5JjcF8KfCOcjk+guPVjSfV

Score
8/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a21949ec73c637a3469bafd53dcaf3d1f942b082c856df58d53cc9289fb851f6.exe
    "C:\Users\Admin\AppData\Local\Temp\a21949ec73c637a3469bafd53dcaf3d1f942b082c856df58d53cc9289fb851f6.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    PID:4596

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4596-132-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/4596-133-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/4596-134-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB