Analysis

  • max time kernel
    29s
  • max time network
    29s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    06/12/2022, 20:28

General

  • Target

    3773b3c24cf31dede3c107f24113fe39c1265e375814f30b3eec00c17c98ebad.exe

  • Size

    751KB

  • MD5

    224400f1bd6a8cf24acde6877d73fc28

  • SHA1

    d86e68750ee6125c56ec7f255091d412b55c5bbb

  • SHA256

    3773b3c24cf31dede3c107f24113fe39c1265e375814f30b3eec00c17c98ebad

  • SHA512

    4400b92bf7d4d977fcf4b2be81aa95eaa5330265657c2b04fb071565fa0db7a0239ba735806e282cfea747b357dcf40771b07eab3b1959c2d1d268447398ce9c

  • SSDEEP

    12288:N6oM/lFe7WlDzpaso3ie+thfifIcKLOPNfGLV22cK9J7lI0PfHSw8wQ:Ij/D/UP3/+thfvbLOPk1q1D

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3773b3c24cf31dede3c107f24113fe39c1265e375814f30b3eec00c17c98ebad.exe
    "C:\Users\Admin\AppData\Local\Temp\3773b3c24cf31dede3c107f24113fe39c1265e375814f30b3eec00c17c98ebad.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1948

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1948-54-0x0000000075DA1000-0x0000000075DA3000-memory.dmp

    Filesize

    8KB

  • memory/1948-55-0x0000000000400000-0x0000000000640000-memory.dmp

    Filesize

    2.2MB

  • memory/1948-56-0x0000000000400000-0x0000000000640000-memory.dmp

    Filesize

    2.2MB