Analysis

  • max time kernel
    112s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 10:30

General

  • Target

    a1ba702657370a5196b5104985c841064a5af715edbebdace522fd1b47946fc4.exe

  • Size

    100KB

  • MD5

    85474578df061beedd82386d0d873aae

  • SHA1

    b7a8afc02c7ffd916511ce4856b5b15401f8a4c5

  • SHA256

    a1ba702657370a5196b5104985c841064a5af715edbebdace522fd1b47946fc4

  • SHA512

    eca5a7a43a4bf2f9d257812def0069225b1b59035e8cdaa8be560d9c2190398296f48c94e8093739e5fc4d1aee03ac8f63e1cc9e007c62a94f2daa12fa58d32c

  • SSDEEP

    1536:f6qkSxsjQbAlQH5hcUb7lZns6LIZorvMqljXzHfoPG0P8dL6hYdBv858KIIsQqHj:ojJeVbA6LsQ3/oPfkfnKIaS/V77

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:760
      • C:\Users\Admin\AppData\Local\Temp\a1ba702657370a5196b5104985c841064a5af715edbebdace522fd1b47946fc4.exe
        "C:\Users\Admin\AppData\Local\Temp\a1ba702657370a5196b5104985c841064a5af715edbebdace522fd1b47946fc4.exe"
        2⤵
        • Drops file in System32 directory
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1028

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1028-132-0x00000000020C0000-0x0000000002140000-memory.dmp

      Filesize

      512KB

    • memory/1028-133-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/1028-134-0x00000000020C0000-0x0000000002140000-memory.dmp

      Filesize

      512KB

    • memory/1028-135-0x00000000005D0000-0x00000000005E0000-memory.dmp

      Filesize

      64KB

    • memory/1028-136-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB