Analysis

  • max time kernel
    40s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2022 10:25

General

  • Target

    4787be17b58865e5741150c0e727bb280d904a3d752ee81282694937aee7dd8b.exe

  • Size

    137KB

  • MD5

    7187569296af3222da0208bd3379f27e

  • SHA1

    2e75ef85b1ad2026a82adde1109efe4747be056f

  • SHA256

    4787be17b58865e5741150c0e727bb280d904a3d752ee81282694937aee7dd8b

  • SHA512

    4414ece0746fdede8017b5335eed02cec893c95e075d608d05b6c1394c26ac3618320a367e647d9041776d20659e9865f7ab26055192165f8bdb650a7a122963

  • SSDEEP

    1536:PvOVRhVQeWVa0mjQXttq7n2k2ezLz3g/VE2LmJiHCIrKbIy5TzlKwa3MwFzJrW92:eVRguQXYnT2F9LmJirrCzvPwDXWx/Y

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4787be17b58865e5741150c0e727bb280d904a3d752ee81282694937aee7dd8b.exe
    "C:\Users\Admin\AppData\Local\Temp\4787be17b58865e5741150c0e727bb280d904a3d752ee81282694937aee7dd8b.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:836
    • C:\Users\Admin\AppData\Local\Temp\4787be17b58865e5741150c0e727bb280d904a3d752ee81282694937aee7dd8b.exe
      ?
      2⤵
        PID:880

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/836-55-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/880-54-0x0000000000000000-mapping.dmp

    • memory/880-56-0x0000000075071000-0x0000000075073000-memory.dmp

      Filesize

      8KB

    • memory/880-60-0x0000000010000000-0x000000001000F000-memory.dmp

      Filesize

      60KB

    • memory/880-61-0x0000000010000000-0x000000001000F000-memory.dmp

      Filesize

      60KB

    • memory/880-57-0x0000000010000000-0x000000001000F000-memory.dmp

      Filesize

      60KB

    • memory/880-62-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/880-63-0x0000000010000000-0x000000001000F000-memory.dmp

      Filesize

      60KB

    • memory/880-64-0x0000000010000000-0x000000001000F000-memory.dmp

      Filesize

      60KB