Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 09:40

General

  • Target

    d002caa2b4930ba9940ed0a54c7fecef6e164b5ed0795b869ad61436b344998c.exe

  • Size

    209KB

  • MD5

    e7bd9c7f181a752f5d084edb1c10f95a

  • SHA1

    a77cd0369998db6dc835706a0f615fe5f5224896

  • SHA256

    d002caa2b4930ba9940ed0a54c7fecef6e164b5ed0795b869ad61436b344998c

  • SHA512

    55bcba3111df0b71813861c7977e0705168c2ab00c51907bf8448a93196898950b92d36d53e7a822189e10426422ebf30af162019e62fae3ed654d61d1caa405

  • SSDEEP

    3072:CL75dw7dh1ioeYJKB41u1v/en8NerNzaDWlRPsQ5yHL0ByyZ07TJct8En314FrsN:CLNB4K+n8NexIWlBDSyOPEl9hbJMNQ

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d002caa2b4930ba9940ed0a54c7fecef6e164b5ed0795b869ad61436b344998c.exe
    "C:\Users\Admin\AppData\Local\Temp\d002caa2b4930ba9940ed0a54c7fecef6e164b5ed0795b869ad61436b344998c.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    PID:852

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/852-54-0x0000000074DA1000-0x0000000074DA3000-memory.dmp

          Filesize

          8KB

        • memory/852-55-0x0000000013140000-0x00000000131D4000-memory.dmp

          Filesize

          592KB

        • memory/852-56-0x0000000013140000-0x00000000131D4000-memory.dmp

          Filesize

          592KB