Analysis

  • max time kernel
    25s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2022, 15:14

General

  • Target

    744ca36d4ea072e4628654b55b28500e7d9f2c33dd40b3349c964e9ee516980e.exe

  • Size

    389KB

  • MD5

    21d507733c1e306460bda3c23e4b6760

  • SHA1

    3c4a81713c6ccaf83ceca48aa57cfc68eea28deb

  • SHA256

    744ca36d4ea072e4628654b55b28500e7d9f2c33dd40b3349c964e9ee516980e

  • SHA512

    05997e17c5dae42827cc03f6fca47898569df0655fabee92fe6fcf66fcdbe50c0839f8834b6f2b3845de9dc4036fe3f609d8ea813e4fe01560b03e587097d5ed

  • SSDEEP

    6144:7no7WPJ1OeSyWzZrkLDkOcWTAbz7lS79Krhiz4FTiSoNoR+Mg2nRHOm3maXt:7ngwSxFYLDkOcWkU9KozE1OBaXt

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Users\Admin\AppData\Local\Temp\744ca36d4ea072e4628654b55b28500e7d9f2c33dd40b3349c964e9ee516980e.exe
    "C:\Users\Admin\AppData\Local\Temp\744ca36d4ea072e4628654b55b28500e7d9f2c33dd40b3349c964e9ee516980e.exe"
    1⤵
      PID:1324

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1324-54-0x0000000075F81000-0x0000000075F83000-memory.dmp

            Filesize

            8KB

          • memory/1324-55-0x0000000000400000-0x00000000004E4000-memory.dmp

            Filesize

            912KB