Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 21:00

General

  • Target

    975b410b54a1db61756d202ebd23917cd99345458925ba973782050db2d12220.exe

  • Size

    121KB

  • MD5

    dc6db1a9855eafd3001f50291d47f49d

  • SHA1

    0355661943513151698ebf4508452104c29bfc0d

  • SHA256

    975b410b54a1db61756d202ebd23917cd99345458925ba973782050db2d12220

  • SHA512

    cec7b10baaea29bfba31b90f3cdc6d6e764b1e76a22f9851e33c1238894d517737ec0fff7998ebf59f74d025770729769350d340e48f13ce98cef002852766a5

  • SSDEEP

    3072:A5urm0irBIlvbLbe7m52FADA2oSSNgA7fIjuu:wuySlTfMm52aD4u

Score
8/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 28 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\975b410b54a1db61756d202ebd23917cd99345458925ba973782050db2d12220.exe
    "C:\Users\Admin\AppData\Local\Temp\975b410b54a1db61756d202ebd23917cd99345458925ba973782050db2d12220.exe"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4948
    • C:\Windows\msa.exe
      C:\Windows\msa.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:1316

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Tasks\{5B57CF47-0BFA-43c6-ACF9-3B3653DCADBA}.job

    Filesize

    426B

    MD5

    351f41c8088e17182ae1daec33c226de

    SHA1

    7f410b004620dae45b59ffdd0b58276ef16c927c

    SHA256

    5e8ff0298f94fca58ad74d1fc76a736e5e4b3037254534e8bc8045856e5c35a4

    SHA512

    edd80a2408bf542ae4066943d19ea7de67eb252bcbfa4a2c2a026b281c232c713324c72ecdde274ad8cac36082215811385b659cf9b9eba9771cb7f6968ecbcb

  • C:\Windows\msa.exe

    Filesize

    121KB

    MD5

    dc6db1a9855eafd3001f50291d47f49d

    SHA1

    0355661943513151698ebf4508452104c29bfc0d

    SHA256

    975b410b54a1db61756d202ebd23917cd99345458925ba973782050db2d12220

    SHA512

    cec7b10baaea29bfba31b90f3cdc6d6e764b1e76a22f9851e33c1238894d517737ec0fff7998ebf59f74d025770729769350d340e48f13ce98cef002852766a5

  • C:\Windows\msa.exe

    Filesize

    121KB

    MD5

    dc6db1a9855eafd3001f50291d47f49d

    SHA1

    0355661943513151698ebf4508452104c29bfc0d

    SHA256

    975b410b54a1db61756d202ebd23917cd99345458925ba973782050db2d12220

    SHA512

    cec7b10baaea29bfba31b90f3cdc6d6e764b1e76a22f9851e33c1238894d517737ec0fff7998ebf59f74d025770729769350d340e48f13ce98cef002852766a5

  • memory/1316-137-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1316-138-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/4948-132-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/4948-139-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB