Analysis

  • max time kernel
    226s
  • max time network
    336s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    06/12/2022, 11:21

General

  • Target

    12f4de50a6b61204f942e482744addad2e5f3d4a665484d52bba7d14b9f5082a.exe

  • Size

    134KB

  • MD5

    b6f16463d9daef954d09bb7009eba6af

  • SHA1

    18e35f1e2b300100c2d2c6a559712d1285c90378

  • SHA256

    12f4de50a6b61204f942e482744addad2e5f3d4a665484d52bba7d14b9f5082a

  • SHA512

    dda9a2121fbb47cafd08537f705a871eda0b8b29dfc6c7e4d4e53970ff98411d87e96e56cf9be10656cf9d478fe2284a72471eeccff0d6a00923fa12d1991bdc

  • SSDEEP

    3072:k+yNquZlSdVI/kY+3aR90ymkNPmkVMCZo+UD5/4:k+LdwkY39/mkNP6wgDq

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12f4de50a6b61204f942e482744addad2e5f3d4a665484d52bba7d14b9f5082a.exe
    "C:\Users\Admin\AppData\Local\Temp\12f4de50a6b61204f942e482744addad2e5f3d4a665484d52bba7d14b9f5082a.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1220
    • C:\Users\Admin\AppData\Local\Temp\12f4de50a6b61204f942e482744addad2e5f3d4a665484d52bba7d14b9f5082a.exe
      ?
      2⤵
        PID:1368

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1220-54-0x00000000759F1000-0x00000000759F3000-memory.dmp

            Filesize

            8KB

          • memory/1220-56-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/1368-58-0x0000000010000000-0x000000001000F000-memory.dmp

            Filesize

            60KB

          • memory/1368-61-0x0000000010000000-0x000000001000F000-memory.dmp

            Filesize

            60KB

          • memory/1368-62-0x0000000010000000-0x000000001000F000-memory.dmp

            Filesize

            60KB

          • memory/1368-63-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/1368-64-0x0000000010000000-0x000000001000F000-memory.dmp

            Filesize

            60KB