Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/12/2022, 01:43

General

  • Target

    e9d9f569c3db831b88fe66894939928eebf89cf9080ab341bba68e8d09410c9c.exe

  • Size

    27KB

  • MD5

    4a9a741d64dc6011d4a00e182c16a935

  • SHA1

    7259659b5cb4cb207bd6104fd08bcf5a5f569a75

  • SHA256

    e9d9f569c3db831b88fe66894939928eebf89cf9080ab341bba68e8d09410c9c

  • SHA512

    97112090f56d09a9fec5337fc4e12e8d62573ccdb3a4dd43faa3b12e373ab5511f06e5d65e29c03e50425871e45704820a85053db8404a0e3a0b66e7634b4e5a

  • SSDEEP

    384:7XvGY+rTTGyTBOu2Bg5Xt0ArZZLOHFfTdAnOg7qveQJ4+twCuu+nNYJLPGBq:7fGvv9QuRyAr7mFfp6CWQJz+n4Lgq

Score
8/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e9d9f569c3db831b88fe66894939928eebf89cf9080ab341bba68e8d09410c9c.exe
    "C:\Users\Admin\AppData\Local\Temp\e9d9f569c3db831b88fe66894939928eebf89cf9080ab341bba68e8d09410c9c.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2128
    • C:\Users\Admin\AppData\Local\Temp\~e56b967.tmp
      C:\Users\Admin\AppData\Local\Temp\~e56b967.tmp
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1272

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\~e56b967.tmp

          Filesize

          6KB

          MD5

          bf570d55a8a787fd36668c087ef9bc2b

          SHA1

          fc0f2d5a31c99e981be903aac75a71e19b7bc1fa

          SHA256

          9b20fe9d403a524296e1c47870a2d77ec322b601f5ef42645bf514bf0c4bfe73

          SHA512

          b8bc2ec85c11a7d225ff4723e608e5ea27e0b7431cd2834c875b3c8160a0798b35306f7d9a32c1fca32eaeaffa57c7ba9e8a1158298962503b7778b35203db68

        • C:\Users\Admin\AppData\Local\Temp\~e56b967.tmp

          Filesize

          6KB

          MD5

          bf570d55a8a787fd36668c087ef9bc2b

          SHA1

          fc0f2d5a31c99e981be903aac75a71e19b7bc1fa

          SHA256

          9b20fe9d403a524296e1c47870a2d77ec322b601f5ef42645bf514bf0c4bfe73

          SHA512

          b8bc2ec85c11a7d225ff4723e608e5ea27e0b7431cd2834c875b3c8160a0798b35306f7d9a32c1fca32eaeaffa57c7ba9e8a1158298962503b7778b35203db68

        • memory/2128-132-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/2128-133-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB