Analysis

  • max time kernel
    214s
  • max time network
    253s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2022, 22:41

General

  • Target

    d06d71c0ffcec4626062d8b15f45aed1911563e118a09d24e31d3384047d766c.exe

  • Size

    1.0MB

  • MD5

    24cfa0f56d2070dab8b31809c9874570

  • SHA1

    a367dc77d64aa20c47e5660262d5913e0cd3c4a2

  • SHA256

    d06d71c0ffcec4626062d8b15f45aed1911563e118a09d24e31d3384047d766c

  • SHA512

    521004d8072654d4fa2771b0e0af0aa3060c0a65095245f35cf48860da126ff211e61bc9aaaa9f900fe58bc36880e6e5f86f2fbdbc0e3a3e93eee67d94fa7484

  • SSDEEP

    24576:LQqAkwwlUSvS3U2wb0aZTKzqCGw1L3v5dGjnA3Kbd:LQqhqS32wIcTfQ3v5ok0d

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d06d71c0ffcec4626062d8b15f45aed1911563e118a09d24e31d3384047d766c.exe
    "C:\Users\Admin\AppData\Local\Temp\d06d71c0ffcec4626062d8b15f45aed1911563e118a09d24e31d3384047d766c.exe"
    1⤵
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:660
    • C:\Users\Admin\AppData\Local\Temp\d06d71c0ffcec4626062d8b15f45aed1911563e118a09d24e31d3384047d766c.exe
      "C:\Users\Admin\AppData\Local\Temp\d06d71c0ffcec4626062d8b15f45aed1911563e118a09d24e31d3384047d766c.exe" Track="0001001000"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1576

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/660-132-0x0000000000400000-0x0000000000589000-memory.dmp

    Filesize

    1.5MB

  • memory/660-136-0x0000000000400000-0x0000000000589000-memory.dmp

    Filesize

    1.5MB

  • memory/1576-134-0x0000000000400000-0x00000000004EA000-memory.dmp

    Filesize

    936KB

  • memory/1576-135-0x0000000000400000-0x00000000004EA000-memory.dmp

    Filesize

    936KB

  • memory/1576-137-0x0000000000400000-0x00000000004EA000-memory.dmp

    Filesize

    936KB

  • memory/1576-138-0x0000000000400000-0x00000000004EA000-memory.dmp

    Filesize

    936KB

  • memory/1576-139-0x0000000000400000-0x00000000004EA000-memory.dmp

    Filesize

    936KB

  • memory/1576-140-0x0000000000400000-0x00000000004EA000-memory.dmp

    Filesize

    936KB