Analysis

  • max time kernel
    14s
  • max time network
    54s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2022 00:53

General

  • Target

    c78b8a3f4b67f2330d5a82985707c7b4f810fbbb494a10726668656dba57adf5.exe

  • Size

    158KB

  • MD5

    6890866a0ea0c7f8bbad79ec98b2a698

  • SHA1

    0c2532c1721eb2f70993dcb90e31fb1cbfdc06bf

  • SHA256

    c78b8a3f4b67f2330d5a82985707c7b4f810fbbb494a10726668656dba57adf5

  • SHA512

    9bd7da0f2ce73533980e218afb025eb1d02bd67b3ccf24ef458762ece2343b0a8f3d6add35ac409bdce39370233193a593371b5c87085544f73858793618a771

  • SSDEEP

    3072:btH9VTPJVF5IbbrqkOQ9qdjh0IBUiIXHBXPqmBe5/KNOkin2Fuw6ayo:5DIOkOQ9I904UiIXhXxjilw6al

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c78b8a3f4b67f2330d5a82985707c7b4f810fbbb494a10726668656dba57adf5.exe
    "C:\Users\Admin\AppData\Local\Temp\c78b8a3f4b67f2330d5a82985707c7b4f810fbbb494a10726668656dba57adf5.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:832

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/832-54-0x0000000075291000-0x0000000075293000-memory.dmp

    Filesize

    8KB

  • memory/832-55-0x0000000000340000-0x000000000035B000-memory.dmp

    Filesize

    108KB

  • memory/832-59-0x0000000000340000-0x000000000035B000-memory.dmp

    Filesize

    108KB

  • memory/832-63-0x0000000000340000-0x000000000035B000-memory.dmp

    Filesize

    108KB

  • memory/832-64-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/832-65-0x0000000000230000-0x0000000000273000-memory.dmp

    Filesize

    268KB