Analysis

  • max time kernel
    136s
  • max time network
    188s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 00:10

General

  • Target

    f3366b6c3f0f4c0c879499c803ac1aeef4045383b96bc4a18eef11960c805ee8.exe

  • Size

    10KB

  • MD5

    b82bdcdc1a15c05a98873da6e7031069

  • SHA1

    5233be4a0d3dee123b6dafa1f8e33d6af5b92dd6

  • SHA256

    f3366b6c3f0f4c0c879499c803ac1aeef4045383b96bc4a18eef11960c805ee8

  • SHA512

    f3915518ceb3d44cfe58bddcd314f607c65f4e95fe9768bd0727da05314f2b9c9f96d1902e6ce7eecb38793d1cc087ff16db4fb91c5f11700d110180bb8520da

  • SSDEEP

    192:XrHkSwQ6+X7fAcc3C1RITtrx7WXXHuDpkLEqlT4fpQDWE:XB6C7Hc3C1STFx7EXLIqlT4+

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f3366b6c3f0f4c0c879499c803ac1aeef4045383b96bc4a18eef11960c805ee8.exe
    "C:\Users\Admin\AppData\Local\Temp\f3366b6c3f0f4c0c879499c803ac1aeef4045383b96bc4a18eef11960c805ee8.exe"
    1⤵
    • Adds policy Run key to start application
    PID:4896

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4896-132-0x0000000000400000-0x0000000000405000-memory.dmp

          Filesize

          20KB

        • memory/4896-133-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/4896-134-0x0000000000400000-0x0000000000405000-memory.dmp

          Filesize

          20KB