Analysis

  • max time kernel
    7s
  • max time network
    35s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 20:33

General

  • Target

    9e8c9a46e06b314a01ec8560110d5eb34b3a6fb93591a0bde86c9f0b51747bb0.exe

  • Size

    146KB

  • MD5

    a907b22f72f3ae7568149ef8c1245908

  • SHA1

    60c54fb082a2024e1f8912ca9e26f78863c0d8ad

  • SHA256

    9e8c9a46e06b314a01ec8560110d5eb34b3a6fb93591a0bde86c9f0b51747bb0

  • SHA512

    b68bf2f652fdf08ec0c9836aa825eccdfca67f01af4efb4d78dffb8cac98e4a5a2f19772d10c48dea6c0bf0907c7782d685be74abd6c0c4fab4436c7d3f19835

  • SSDEEP

    3072:jH/JGI8ANIXDQNYj77hBOv7HrFB8aC/Srz7F2DSzOuoT1O8:jdYQNg7dgHhuaCeF2DSauoRP

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e8c9a46e06b314a01ec8560110d5eb34b3a6fb93591a0bde86c9f0b51747bb0.exe
    "C:\Users\Admin\AppData\Local\Temp\9e8c9a46e06b314a01ec8560110d5eb34b3a6fb93591a0bde86c9f0b51747bb0.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2040 -s 104
      2⤵
      • Program crash
      PID:1180

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2040-55-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB