Analysis

  • max time kernel
    182s
  • max time network
    193s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 12:59

General

  • Target

    e6873395d12f40cf49ebff7f274370316aa11b0dab109a1e00894c4d191977fc.exe

  • Size

    2.5MB

  • MD5

    4e693a02b81a9b2e4a7573ec1e54bbd4

  • SHA1

    906e50de79a732bee32c09e79e45f0a1ae758900

  • SHA256

    e6873395d12f40cf49ebff7f274370316aa11b0dab109a1e00894c4d191977fc

  • SHA512

    c0474624e3e92cee8d06dc286fd7eaa9e3960a36f4c073db34f6cfa6767dea269b1e265cb165c01a4e1c2bd1ed95e9b4841db4a25fe46e49e084e3be230dbf5f

  • SSDEEP

    49152:rUeedVTfE98rTTINj3z9iRZ3toOsezg1sE4oCBC6M7sXdM1+WHSk:r7ed29UqjEZdoOXHo/MM+WHSk

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e6873395d12f40cf49ebff7f274370316aa11b0dab109a1e00894c4d191977fc.exe
    "C:\Users\Admin\AppData\Local\Temp\e6873395d12f40cf49ebff7f274370316aa11b0dab109a1e00894c4d191977fc.exe"
    1⤵
      PID:1064

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1064-132-0x0000000000400000-0x0000000000460000-memory.dmp

      Filesize

      384KB

    • memory/1064-133-0x0000000000400000-0x0000000000460000-memory.dmp

      Filesize

      384KB