Analysis

  • max time kernel
    226s
  • max time network
    238s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-10-2022 11:43

General

  • Target

    c1ac6f194aea92b79856a6f6ec65ae06e170196ef64c01af65ea718b00c046d5.exe

  • Size

    495KB

  • MD5

    390cc868507f18b98eb2ab2a62c2a855

  • SHA1

    32dee8b461a22a1de220c1aa6793a4ccda343ec0

  • SHA256

    c1ac6f194aea92b79856a6f6ec65ae06e170196ef64c01af65ea718b00c046d5

  • SHA512

    a1d89a2a07d2ec33e4b939176d06914efda42b9f5249e6891bc6d91972e192210b8ed49e3bdda92b0c4309ae6f867ea35a0e794f00cadcb64330f40dffe16d8c

  • SSDEEP

    12288:sWIU4UzpDJLbArJuEz+Wj9aiMmvXLYLbZyz:7z2daN7Y7+4

Score
8/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 2 IoCs

    SCSI information is often read in order to detect sandboxing environments.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c1ac6f194aea92b79856a6f6ec65ae06e170196ef64c01af65ea718b00c046d5.exe
    "C:\Users\Admin\AppData\Local\Temp\c1ac6f194aea92b79856a6f6ec65ae06e170196ef64c01af65ea718b00c046d5.exe"
    1⤵
    • Adds Run key to start application
    • Checks SCSI registry key(s)
    PID:1296

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1296-132-0x0000000000400000-0x0000000000505000-memory.dmp

    Filesize

    1.0MB

  • memory/1296-133-0x0000000000400000-0x0000000000505000-memory.dmp

    Filesize

    1.0MB

  • memory/1296-134-0x0000000000400000-0x0000000000505000-memory.dmp

    Filesize

    1.0MB