Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 07:31

General

  • Target

    e55253eb03052b3963a69904728bdbe8e5305e06a092aa8368ad441cdcf06bc0.exe

  • Size

    130KB

  • MD5

    eeef649a5375d46c10cc0281221cfd69

  • SHA1

    4df4b960ed0dd9794318f9317c61a3a5115f7508

  • SHA256

    e55253eb03052b3963a69904728bdbe8e5305e06a092aa8368ad441cdcf06bc0

  • SHA512

    4a1ff50473684767436b52082c1fffe5a52c513ada2640c2eca04f4659c37f1c1140da53b0c34cbe8c7d2596c78634568e7ca118907afbac8e9d96e41a0c8e3a

  • SSDEEP

    1536:CkzuOBT8Ydsem1QnO8+EiFkgQBQ7A3RlOaT8QcgM9rdzOSGG00CnbOBIjAlBA4bY:pTG1QgWruEHVs3CbOqjsXb8eidXW0/b

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e55253eb03052b3963a69904728bdbe8e5305e06a092aa8368ad441cdcf06bc0.exe
    "C:\Users\Admin\AppData\Local\Temp\e55253eb03052b3963a69904728bdbe8e5305e06a092aa8368ad441cdcf06bc0.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4696
    • C:\Users\Admin\AppData\Local\Temp\e55253eb03052b3963a69904728bdbe8e5305e06a092aa8368ad441cdcf06bc0.exe
      ?
      2⤵
      • Suspicious behavior: GetForegroundWindowSpam
      PID:868

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/868-134-0x0000000010000000-0x000000001000F000-memory.dmp

          Filesize

          60KB

        • memory/868-137-0x0000000010000000-0x000000001000F000-memory.dmp

          Filesize

          60KB

        • memory/868-138-0x0000000010000000-0x000000001000F000-memory.dmp

          Filesize

          60KB

        • memory/868-139-0x0000000000400000-0x0000000000426000-memory.dmp

          Filesize

          152KB

        • memory/868-140-0x0000000010000000-0x000000001000F000-memory.dmp

          Filesize

          60KB

        • memory/4696-133-0x0000000000400000-0x0000000000426000-memory.dmp

          Filesize

          152KB