Analysis

  • max time kernel
    137s
  • max time network
    103s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 13:37

General

  • Target

    3120f7001e56ea5ceaee306e22c3c4f94a16d4935c946a886fedb3fb34079167.exe

  • Size

    232KB

  • MD5

    b4b8af70fdc5039ac0883a715ec75197

  • SHA1

    d4d470053c214b0660517c419a786bf54beb00d6

  • SHA256

    3120f7001e56ea5ceaee306e22c3c4f94a16d4935c946a886fedb3fb34079167

  • SHA512

    bf2f630918a2d79cb81c08a701cfbb8ae1f1e378994f92518a5bc3af70e1f9ece5bf02744b0d6f1a7b61eca1c29977d6e3c36bdd2d15da7c324bbd1db326d2b5

  • SSDEEP

    6144:49kW9pME2UB64kOWSOQPnXZKfRuNPi7KWELO:spSEpB64kOLPXk5udiOWEL

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3120f7001e56ea5ceaee306e22c3c4f94a16d4935c946a886fedb3fb34079167.exe
    "C:\Users\Admin\AppData\Local\Temp\3120f7001e56ea5ceaee306e22c3c4f94a16d4935c946a886fedb3fb34079167.exe"
    1⤵
    • Loads dropped DLL
    PID:1432

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\gFt7B14t2.dll

          Filesize

          387KB

          MD5

          3d5b3a91f8a9f212066545097d4992b4

          SHA1

          af65d21c2269da258ed7ced7e0d5dc7307b28b0e

          SHA256

          8fce90b43afb03eb26acde7cccb2f8defec6a6eff4bd6c401883c7f78642da4c

          SHA512

          a3148aedd80a34886333ae9af6b0aaac2302b2696f44eb2528a43e737b972ee686a6ba4e97bb3a1ffaaba039e61b7395ef053aa991a2dce397b1ab0d727f9888

        • memory/1432-54-0x0000000075FB1000-0x0000000075FB3000-memory.dmp

          Filesize

          8KB

        • memory/1432-55-0x0000000000400000-0x000000000049E000-memory.dmp

          Filesize

          632KB

        • memory/1432-57-0x0000000001F80000-0x0000000001FEB000-memory.dmp

          Filesize

          428KB

        • memory/1432-58-0x0000000000400000-0x000000000049E000-memory.dmp

          Filesize

          632KB

        • memory/1432-59-0x0000000000400000-0x000000000049E000-memory.dmp

          Filesize

          632KB