Analysis

  • max time kernel
    69s
  • max time network
    88s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2022, 09:44

General

  • Target

    90b74a95fbddd31d1691a93893c68ebe3bcbed962074c5aa775817a4771a7689.exe

  • Size

    685KB

  • MD5

    f34576abfe164aa53a8e4b8fdc02334e

  • SHA1

    53d472c861d00392a2ac0a63419fc03e72428bc0

  • SHA256

    90b74a95fbddd31d1691a93893c68ebe3bcbed962074c5aa775817a4771a7689

  • SHA512

    c65fb75cd5e2575e312b73b6e9d0ea5ad3101d6bd38d2a2c35dcb553b885ac14e0f63dd4c0853489e84b9384fabebd300534a3c123b00ae31392a8824c132256

  • SSDEEP

    12288:Y7wMuUzmA/EQtv6jlxqAq7ahmhVH7moEGCnxjyRy8yP:Y7RVzrEQtvWCAROxEhFDzP

Score
8/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\90b74a95fbddd31d1691a93893c68ebe3bcbed962074c5aa775817a4771a7689.exe
    "C:\Users\Admin\AppData\Local\Temp\90b74a95fbddd31d1691a93893c68ebe3bcbed962074c5aa775817a4771a7689.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1324

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1324-54-0x0000000075F51000-0x0000000075F53000-memory.dmp

          Filesize

          8KB

        • memory/1324-55-0x0000000000400000-0x00000000004AD000-memory.dmp

          Filesize

          692KB

        • memory/1324-56-0x0000000000400000-0x00000000004AD000-memory.dmp

          Filesize

          692KB