Analysis

  • max time kernel
    150s
  • max time network
    60s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    30/11/2022, 23:45

General

  • Target

    d0e946b5ee1acd4de6788ef7d3bc96ecf7126d633c3cf6fce29753f35d1d0310.exe

  • Size

    281KB

  • MD5

    c15abd64ce153dac0c005bf7d965ec8d

  • SHA1

    fed336eb895ba3a61b6fb7aec57d3d3ada44006a

  • SHA256

    d0e946b5ee1acd4de6788ef7d3bc96ecf7126d633c3cf6fce29753f35d1d0310

  • SHA512

    eecacca6e5d02db633362fdfc6fa3fd728809d9f6ecbc15890f20b22e032fa633fcd87e854075106173deccc4113c189363894bd08a3cd448f560357d24dd6cf

  • SSDEEP

    6144:AScrLm4mp8D6WGc/YSlIipBReubLzeh7Yy0DMIdeXijM:Rcpy78QSVnNyhsFMCeSjM

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d0e946b5ee1acd4de6788ef7d3bc96ecf7126d633c3cf6fce29753f35d1d0310.exe
    "C:\Users\Admin\AppData\Local\Temp\d0e946b5ee1acd4de6788ef7d3bc96ecf7126d633c3cf6fce29753f35d1d0310.exe"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:1768

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1768-54-0x0000000075931000-0x0000000075933000-memory.dmp

    Filesize

    8KB

  • memory/1768-55-0x0000000001D40000-0x0000000001DB2000-memory.dmp

    Filesize

    456KB

  • memory/1768-56-0x0000000001D40000-0x0000000001E40000-memory.dmp

    Filesize

    1024KB

  • memory/1768-57-0x0000000001D40000-0x0000000001E40000-memory.dmp

    Filesize

    1024KB