Analysis

  • max time kernel
    23s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06/12/2022, 07:36 UTC

General

  • Target

    e0f7bf80463494c29c4f1da39901bcbbe4d72573755d693fdd23bbc5dbbc06fd.exe

  • Size

    133KB

  • MD5

    543deb195800a08c6ef7f0bf62e41900

  • SHA1

    35a3e49658534f1c4d655e0e6b01fa9d64b5c741

  • SHA256

    e0f7bf80463494c29c4f1da39901bcbbe4d72573755d693fdd23bbc5dbbc06fd

  • SHA512

    e7c62dd57613813f65fdffa46a77873fdfb0a950c7d25bb9225dc2d1c017f05e817409986e83f8295cb9783de57a0649d48b0d60d181e7ace2c0917a8db9982c

  • SSDEEP

    3072:oV3pohYwhZk6qifphYSoA0GbhbhiBqiUD8/v:VXw6VDY5A0GbviBq/DA

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e0f7bf80463494c29c4f1da39901bcbbe4d72573755d693fdd23bbc5dbbc06fd.exe
    "C:\Users\Admin\AppData\Local\Temp\e0f7bf80463494c29c4f1da39901bcbbe4d72573755d693fdd23bbc5dbbc06fd.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1428
    • C:\Users\Admin\AppData\Local\Temp\e0f7bf80463494c29c4f1da39901bcbbe4d72573755d693fdd23bbc5dbbc06fd.exe
      ?
      2⤵
        PID:1608

    Network

    • flag-unknown
      DNS
      mysumsung.ru
      e0f7bf80463494c29c4f1da39901bcbbe4d72573755d693fdd23bbc5dbbc06fd.exe
      Remote address:
      8.8.8.8:53
      Request
      mysumsung.ru
      IN A
      Response
    No results found
    • 8.8.8.8:53
      mysumsung.ru
      dns
      e0f7bf80463494c29c4f1da39901bcbbe4d72573755d693fdd23bbc5dbbc06fd.exe
      58 B
      119 B
      1
      1

      DNS Request

      mysumsung.ru

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1428-55-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB

    • memory/1608-56-0x0000000076261000-0x0000000076263000-memory.dmp

      Filesize

      8KB

    • memory/1608-57-0x0000000010000000-0x000000001000F000-memory.dmp

      Filesize

      60KB

    • memory/1608-60-0x0000000010000000-0x000000001000F000-memory.dmp

      Filesize

      60KB

    • memory/1608-61-0x0000000010000000-0x000000001000F000-memory.dmp

      Filesize

      60KB

    • memory/1608-62-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB

    • memory/1608-63-0x0000000010000000-0x000000001000F000-memory.dmp

      Filesize

      60KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.