Analysis

  • max time kernel
    43s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 18:18

General

  • Target

    9671a582922f51efda4753bd9c5908be22df73ac49a2a2f189443714ca58511c.exe

  • Size

    167KB

  • MD5

    901e312b12f8f7157ca6d3344d2f3405

  • SHA1

    7dcde5189970b0946360b57e97f823287602f6bf

  • SHA256

    9671a582922f51efda4753bd9c5908be22df73ac49a2a2f189443714ca58511c

  • SHA512

    ce588b0ed713fa00e27d0491c8a211bf812aa5f18f91bb97e908302bf7e80a28fa3c74678a8079aa9f681b8c904235ca863203b18e8b8992335e15ca82c5b4df

  • SSDEEP

    1536:hwWgEEXv9XwZU1fMpL96l/UXxvuri65kwYFgnfxDaEGvYMeEJJwBnn1G3TS64a6D:+E2v2a1fw96BIupkLYfx+E0VG1KSoS

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1216
      • C:\Users\Admin\AppData\Local\Temp\9671a582922f51efda4753bd9c5908be22df73ac49a2a2f189443714ca58511c.exe
        "C:\Users\Admin\AppData\Local\Temp\9671a582922f51efda4753bd9c5908be22df73ac49a2a2f189443714ca58511c.exe"
        2⤵
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:768

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/768-54-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/768-58-0x0000000000400000-0x0000000000416000-memory.dmp

      Filesize

      88KB

    • memory/768-59-0x0000000000220000-0x0000000000236000-memory.dmp

      Filesize

      88KB

    • memory/1216-55-0x0000000002200000-0x0000000002209000-memory.dmp

      Filesize

      36KB

    • memory/1216-57-0x0000000002200000-0x0000000002209000-memory.dmp

      Filesize

      36KB