Analysis

  • max time kernel
    160s
  • max time network
    188s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 10:52

General

  • Target

    2eb2f5196894b2b43126b7fe9cf4d5fdea976e6ea0e996e7547db55e0eb34d30.exe

  • Size

    132KB

  • MD5

    7923a4ff8ff2e8f312490ba48cfe1b64

  • SHA1

    d9ea1c81e392ef17791ae3bf743847488f228a5f

  • SHA256

    2eb2f5196894b2b43126b7fe9cf4d5fdea976e6ea0e996e7547db55e0eb34d30

  • SHA512

    7ab96a5b09e4ea4f34023a8aa7e942cd14b8ea31108f1151f670dc8c7c0c5c5717d4cac4170b4bf357d267e7fbe5c43038a449ef5473ea950a450b5a7b52ecd5

  • SSDEEP

    1536:Dwsqd3Ag1jTXUnTcsK5/hKjI+kFHZ/KwTuIGmA2N5lOdys7mz9CkUdN/s/U:DwB1xUTckI+W5/LA2N5lOMUmzPUDE/U

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2eb2f5196894b2b43126b7fe9cf4d5fdea976e6ea0e996e7547db55e0eb34d30.exe
    "C:\Users\Admin\AppData\Local\Temp\2eb2f5196894b2b43126b7fe9cf4d5fdea976e6ea0e996e7547db55e0eb34d30.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4824
    • C:\Users\Admin\AppData\Local\Temp\2eb2f5196894b2b43126b7fe9cf4d5fdea976e6ea0e996e7547db55e0eb34d30.exe
      ?
      2⤵
        PID:4912

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4824-133-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB

    • memory/4912-134-0x0000000010000000-0x000000001000F000-memory.dmp

      Filesize

      60KB

    • memory/4912-137-0x0000000010000000-0x000000001000F000-memory.dmp

      Filesize

      60KB

    • memory/4912-138-0x0000000010000000-0x000000001000F000-memory.dmp

      Filesize

      60KB

    • memory/4912-139-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB

    • memory/4912-140-0x0000000010000000-0x000000001000F000-memory.dmp

      Filesize

      60KB

    • memory/4912-141-0x0000000010000000-0x000000001000F000-memory.dmp

      Filesize

      60KB