Analysis

  • max time kernel
    205s
  • max time network
    210s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 08:30

General

  • Target

    ad8791a2605376e00e12f61ab8809c7fa753cd519a25ee46f709fbf610c78535.exe

  • Size

    53KB

  • MD5

    4762e5753d5a12e18d77d6f42e240e85

  • SHA1

    3145e6b2b55530f1d9d3795c13cc66e157a0423f

  • SHA256

    ad8791a2605376e00e12f61ab8809c7fa753cd519a25ee46f709fbf610c78535

  • SHA512

    fbe6ab0dd36cdc5aa54c8b3d190297e854279bfbe5d7eb97dfb3786dbd1163a6982f5d48a7c1cd4f533dd9f0979e7022b8e8dbe1a472796354e40d1c5ac25e10

  • SSDEEP

    1536:SNqaLV8a6jQrJ/RhcbwJXPYQZAptMDMot9Wq:SNqMoi/fZ/YQZA8DMoN

Score
8/10

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad8791a2605376e00e12f61ab8809c7fa753cd519a25ee46f709fbf610c78535.exe
    "C:\Users\Admin\AppData\Local\Temp\ad8791a2605376e00e12f61ab8809c7fa753cd519a25ee46f709fbf610c78535.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Drops file in Windows directory
    PID:3348

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3348-132-0x0000000000800000-0x000000000080D000-memory.dmp

          Filesize

          52KB