Analysis

  • max time kernel
    139s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 11:21

General

  • Target

    12f4de50a6b61204f942e482744addad2e5f3d4a665484d52bba7d14b9f5082a.exe

  • Size

    134KB

  • MD5

    b6f16463d9daef954d09bb7009eba6af

  • SHA1

    18e35f1e2b300100c2d2c6a559712d1285c90378

  • SHA256

    12f4de50a6b61204f942e482744addad2e5f3d4a665484d52bba7d14b9f5082a

  • SHA512

    dda9a2121fbb47cafd08537f705a871eda0b8b29dfc6c7e4d4e53970ff98411d87e96e56cf9be10656cf9d478fe2284a72471eeccff0d6a00923fa12d1991bdc

  • SSDEEP

    3072:k+yNquZlSdVI/kY+3aR90ymkNPmkVMCZo+UD5/4:k+LdwkY39/mkNP6wgDq

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12f4de50a6b61204f942e482744addad2e5f3d4a665484d52bba7d14b9f5082a.exe
    "C:\Users\Admin\AppData\Local\Temp\12f4de50a6b61204f942e482744addad2e5f3d4a665484d52bba7d14b9f5082a.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3300
    • C:\Users\Admin\AppData\Local\Temp\12f4de50a6b61204f942e482744addad2e5f3d4a665484d52bba7d14b9f5082a.exe
      ?
      2⤵
        PID:3064

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/3064-134-0x0000000010000000-0x000000001000F000-memory.dmp

            Filesize

            60KB

          • memory/3064-137-0x0000000010000000-0x000000001000F000-memory.dmp

            Filesize

            60KB

          • memory/3064-138-0x0000000010000000-0x000000001000F000-memory.dmp

            Filesize

            60KB

          • memory/3064-139-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/3064-140-0x0000000010000000-0x000000001000F000-memory.dmp

            Filesize

            60KB

          • memory/3300-133-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB