Analysis

  • max time kernel
    133s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-11-2022 08:30

General

  • Target

    53ab4dc8d9f6d615917214b0d986115096e911c7da93d6dde1d26b63e68c38c0.exe

  • Size

    307KB

  • MD5

    0d5bb88408dcbe17881d8ca63d61d014

  • SHA1

    4ffa2198394897377f69282a0afc770085630826

  • SHA256

    53ab4dc8d9f6d615917214b0d986115096e911c7da93d6dde1d26b63e68c38c0

  • SHA512

    de078616bbbca3be1c6e07105b0faeed68835f2effd82c6a1de4fcc1be08b780a65dd6aadee5f842710020eb1c31b1c4214ab3c6737e74602fc15fa5d44d594d

  • SSDEEP

    6144:j1db49+rEg024fpLZazEjvE/rbay19tSt4bO2BaDmeBJe/ZVJy2wvw8fWk:jjkArEN249AyE/rbaMct4bO2/vLj8J

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Users\Admin\AppData\Local\Temp\53ab4dc8d9f6d615917214b0d986115096e911c7da93d6dde1d26b63e68c38c0.exe
    "C:\Users\Admin\AppData\Local\Temp\53ab4dc8d9f6d615917214b0d986115096e911c7da93d6dde1d26b63e68c38c0.exe"
    1⤵
      PID:3996

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3996-132-0x0000000000400000-0x00000000004C0000-memory.dmp

      Filesize

      768KB

    • memory/3996-133-0x0000000000400000-0x00000000004C0000-memory.dmp

      Filesize

      768KB