Analysis

  • max time kernel
    42s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 12:13

General

  • Target

    f7df9578e704211b64087de7dd6c090e15966941b170162e8deddc05eaf58c10.exe

  • Size

    54KB

  • MD5

    68da9cf8e7bf2ea7842928fbb50b3ed5

  • SHA1

    a42598da93555a4f88598eadf437a41309b204aa

  • SHA256

    f7df9578e704211b64087de7dd6c090e15966941b170162e8deddc05eaf58c10

  • SHA512

    f829182b89e0b9e0a7eec0160da2c8c73319087facd877a28b98c110b495b7b0887814a9b68b25882bbe949401fa8e6699e486acbdcba5bc139ebd158b8a3d30

  • SSDEEP

    768:PvcFgtxLURvlWZiusjdsCGVNAf3v6mFJi+OO96cdKTdrPrw6:Hc+txLUZdsCaNA1V65

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7df9578e704211b64087de7dd6c090e15966941b170162e8deddc05eaf58c10.exe
    "C:\Users\Admin\AppData\Local\Temp\f7df9578e704211b64087de7dd6c090e15966941b170162e8deddc05eaf58c10.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious behavior: RenamesItself
    PID:1192

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1192-54-0x0000000074FD1000-0x0000000074FD3000-memory.dmp

          Filesize

          8KB

        • memory/1192-55-0x0000000000400000-0x000000000040F000-memory.dmp

          Filesize

          60KB