Analysis

  • max time kernel
    37s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 13:09

General

  • Target

    3cb632c8545c33029f855f4fc98fc09a6a5b136136f7ce44cbec93b057fdde05.exe

  • Size

    82KB

  • MD5

    4f79152da936062720ebd14c692f6e10

  • SHA1

    1946a2eaf530b535e676c60a407fd37d6d823c70

  • SHA256

    3cb632c8545c33029f855f4fc98fc09a6a5b136136f7ce44cbec93b057fdde05

  • SHA512

    e40bfed7ae513397728efaa92996a8ab52604179d96a015ba7758739c6a566649bee6bf0432c45be9d10707f9a0f1e0737d75a8cf469addd3f8e3566a5677045

  • SSDEEP

    1536:MHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6XJJzVt/2YRmA7hGRhTmtUVX0oTC:MHoLde/OgV432UcP39hXJZn/UEkTa8XA

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3cb632c8545c33029f855f4fc98fc09a6a5b136136f7ce44cbec93b057fdde05.exe
    "C:\Users\Admin\AppData\Local\Temp\3cb632c8545c33029f855f4fc98fc09a6a5b136136f7ce44cbec93b057fdde05.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:1488

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1488-54-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1488-55-0x0000000000220000-0x0000000000224000-memory.dmp

    Filesize

    16KB