Analysis

  • max time kernel
    7s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04-12-2022 05:32

General

  • Target

    c8640ff99164c87beb88e4185b959a00154aa549158b190c1fe25bbf9104ff82.exe

  • Size

    72KB

  • MD5

    915e83064def378a8531ee726a801377

  • SHA1

    8d545f27ded7c01f780c627f466e75464a7f4a57

  • SHA256

    c8640ff99164c87beb88e4185b959a00154aa549158b190c1fe25bbf9104ff82

  • SHA512

    3db888d16c3409ddc52b3cdc446b336d458f11b0cd295a1dfaf882a32b52b212f2e6c5cadb45a80f0197e95164d4585dfa48caa6c5941623e73da93f1a92fb14

  • SSDEEP

    1536:n8YbLO/Cti+PNkQx9/dneuP/YOYoHwuJKq6/85BJtFHDy:JqPWkQx9Veo/ZYzoJ/

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c8640ff99164c87beb88e4185b959a00154aa549158b190c1fe25bbf9104ff82.exe
    "C:\Users\Admin\AppData\Local\Temp\c8640ff99164c87beb88e4185b959a00154aa549158b190c1fe25bbf9104ff82.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:996
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 996 -s 48
      2⤵
      • Program crash
      PID:952

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/952-54-0x0000000000000000-mapping.dmp

  • memory/996-55-0x0000000001320000-0x0000000001353000-memory.dmp

    Filesize

    204KB