Analysis

  • max time kernel
    10s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 15:59

General

  • Target

    f82335fc8f7f695c1de1f3338979bffb2912b8d32d09c6ce907b48df92b0df5b.exe

  • Size

    17KB

  • MD5

    6f6562b9e702ab657e135531d7c8fed7

  • SHA1

    82967ce1bef590991cefa3f1a922630cddaafaee

  • SHA256

    f82335fc8f7f695c1de1f3338979bffb2912b8d32d09c6ce907b48df92b0df5b

  • SHA512

    c4d9272d523d3c029df396e7c3ca22f8584c16e0c2f30b81bb6a39ce8fb1a8a1f5010c7c3e19c91caec140da22a33ce3036c0c2cb52c3198b6035bb898bbd12e

  • SSDEEP

    384:nl8kcNKFYVdO0ILejUw9qFDlcWvqyZDtdlcumjnUK:nl87NAYVw3Lejh9qleWvRLlctU

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f82335fc8f7f695c1de1f3338979bffb2912b8d32d09c6ce907b48df92b0df5b.exe
    "C:\Users\Admin\AppData\Local\Temp\f82335fc8f7f695c1de1f3338979bffb2912b8d32d09c6ce907b48df92b0df5b.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1912
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1912 -s 92
      2⤵
      • Program crash
      PID:2012

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1912-55-0x0000000000400000-0x0000000000912000-memory.dmp

    Filesize

    5.1MB