Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-08-2023 12:33

General

  • Target

    a10124b645e663c7abd7bcbe8373b8e11c69bb2ab2cf1fad78417a15b7f54dbd.exe

  • Size

    246KB

  • MD5

    b8af7b2cbdda1d28d1f816698422f740

  • SHA1

    a0cbdfc6232e666b069db2b4c28579ac7539a231

  • SHA256

    a10124b645e663c7abd7bcbe8373b8e11c69bb2ab2cf1fad78417a15b7f54dbd

  • SHA512

    68ae5964d444e90807c471bfb552488b89bd3b77baa7e1509c6a416c304eab5d97ab6e5c0c2dc63497ee7412855a94880fad0e2259decf315264572fa202c04f

  • SSDEEP

    6144:iMooVQnnOBccnskYPmTpUxrr1XRA7WHxWoN+J0EafCUSYibN6WGm:dQnO/s1mTpG5bUo4bafVibvz

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a10124b645e663c7abd7bcbe8373b8e11c69bb2ab2cf1fad78417a15b7f54dbd.exe
    "C:\Users\Admin\AppData\Local\Temp\a10124b645e663c7abd7bcbe8373b8e11c69bb2ab2cf1fad78417a15b7f54dbd.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c systeminfo>>C:\Windows\temp\setup_gitlog.txt&ping 8.8.8.8>>C:\Windows\temp\setup_gitlog.txt
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4368
      • C:\Windows\SysWOW64\systeminfo.exe
        systeminfo
        3⤵
        • Gathers system information
        PID:2820
      • C:\Windows\SysWOW64\PING.EXE
        ping 8.8.8.8
        3⤵
        • Runs ping.exe
        PID:1876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\temp\setup_gitlog.txt

    Filesize

    33B

    MD5

    346bbdef8e66561ce4c33013160d7c75

    SHA1

    023e40d5eb04b2d7e8346ea0c9a62b05d372abec

    SHA256

    ce357dc9d96cbb6933f7895d5fee9052b72733c2db9fc32b1555761b1bd0c277

    SHA512

    f2fd0412846455ee0f47f9e88192ea4c6ee60c3118be40a44c9b626566652ed46b1c3a0708a7ec6feba7a9cafc61091a2a1c6cb864a99a081bb842625040594f

  • memory/1600-134-0x0000000000400000-0x0000000001C5B000-memory.dmp

    Filesize

    24.4MB

  • memory/1600-135-0x0000000000400000-0x0000000001C5B000-memory.dmp

    Filesize

    24.4MB