Analysis

  • max time kernel
    126s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-10-2022 04:04

General

  • Target

    46a662de0a2ac28d4bed75c83f1656da13d5f83372a2927d6ad88d040fbf3369.exe

  • Size

    667KB

  • MD5

    80b914da6a04d7372a1fde5da8df0a60

  • SHA1

    b260be7b0569fdf89bb3d35fcbd4d2b1bbcbf15f

  • SHA256

    46a662de0a2ac28d4bed75c83f1656da13d5f83372a2927d6ad88d040fbf3369

  • SHA512

    a27439474ca154931f37d57e80e1f2e3210e3507556c786904f0b0306ba5a625b70984a64bb1801dc4db3f25a8e76c4afad2038ac973a6bc24b91710e2276d76

  • SSDEEP

    12288:qvppvF/vS00mTbFw9TjMLmGOnLtrDuyjwMdD85XUZqs:qvLvhvSLmTbFwjMS1tfqMiXUZqs

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\46a662de0a2ac28d4bed75c83f1656da13d5f83372a2927d6ad88d040fbf3369.exe
    "C:\Users\Admin\AppData\Local\Temp\46a662de0a2ac28d4bed75c83f1656da13d5f83372a2927d6ad88d040fbf3369.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4980

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4980-132-0x0000000002420000-0x0000000002567000-memory.dmp

    Filesize

    1.3MB

  • memory/4980-135-0x0000000002420000-0x0000000002567000-memory.dmp

    Filesize

    1.3MB

  • memory/4980-137-0x0000000002420000-0x0000000002567000-memory.dmp

    Filesize

    1.3MB

  • memory/4980-138-0x0000000002220000-0x00000000022C7000-memory.dmp

    Filesize

    668KB

  • memory/4980-136-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4980-139-0x0000000002420000-0x0000000002567000-memory.dmp

    Filesize

    1.3MB

  • memory/4980-140-0x0000000002420000-0x0000000002567000-memory.dmp

    Filesize

    1.3MB

  • memory/4980-141-0x0000000002420000-0x0000000002567000-memory.dmp

    Filesize

    1.3MB