Analysis

  • max time kernel
    25s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06/11/2022, 12:49

General

  • Target

    74e132408c5a8c6f477726d34261ee2e41a56be2b3411de34147b82a814a9f42.exe

  • Size

    275KB

  • MD5

    0d74e254b3e2bc2183247fec8c749f3d

  • SHA1

    058a86978b1692aba28e58a3a888dbb89a28ceb5

  • SHA256

    74e132408c5a8c6f477726d34261ee2e41a56be2b3411de34147b82a814a9f42

  • SHA512

    1a3235001f919b46395c64a45c055320f6c7eca2e5169400b1a94f8f8c1ecfe8425ac02b875395df726db7a7b80cd9b1d877ec5e8082261adbf9979cc9378b5f

  • SSDEEP

    6144:6pQ1LkmWdDP41jWhp+eQAwmgCwWssEmg8Zn8YkX9LEvjq5XQ3:6yL9WdDg5CQeXd58Y0Erq5XQ

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\74e132408c5a8c6f477726d34261ee2e41a56be2b3411de34147b82a814a9f42.exe
    "C:\Users\Admin\AppData\Local\Temp\74e132408c5a8c6f477726d34261ee2e41a56be2b3411de34147b82a814a9f42.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 36
      2⤵
      • Program crash
      PID:852

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1628-55-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB