Analysis

  • max time kernel
    139s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/08/2023, 17:22

General

  • Target

    df22ae701355252a5b5d66a6261a54fca9e75505a90dde450dc8caf7f8fb3288.exe

  • Size

    776KB

  • MD5

    ea64124da3e895faeac665abfac1ee2b

  • SHA1

    d6b43795f8f8cd4594d75f69c6644d5718b4c033

  • SHA256

    df22ae701355252a5b5d66a6261a54fca9e75505a90dde450dc8caf7f8fb3288

  • SHA512

    a72706dc10ada9864b08296a95e94ea8f62060847f0a1409f5d6737888a94fcf3ce568062268a79b8bc1d95dafb9047b4f00833203ab3e92693af763188c9c90

  • SSDEEP

    24576:tc/vpU5FwZmlVW70RWVxaHZiWQHxbjMQ:tc3pU5FwaGaHZr+xp

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df22ae701355252a5b5d66a6261a54fca9e75505a90dde450dc8caf7f8fb3288.exe
    "C:\Users\Admin\AppData\Local\Temp\df22ae701355252a5b5d66a6261a54fca9e75505a90dde450dc8caf7f8fb3288.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:1404
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1404 -s 2492
      2⤵
      • Program crash
      PID:3848
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1404 -s 2764
      2⤵
      • Program crash
      PID:3964
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1404 -ip 1404
    1⤵
      PID:4752
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1404 -ip 1404
      1⤵
        PID:5072

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\config.ini

              Filesize

              51B

              MD5

              2fe6a9ac8d1b8aa4868ecb32e5967664

              SHA1

              e014dc4278458812fac60ba5cea88a1647a0bca8

              SHA256

              f9b9c509d895420f3e54aa226a4eea13bc4f7275860228e837bb8e954c3db88a

              SHA512

              8513eb6e149241fa9434785994a20973ca1d1c049d33c0b4c78ede6b5518e3a1efaf14f55d4ade8847a30067c2cd4a1a657638d7aa4f2cb36ae35b33c595379d

            • C:\Users\Admin\AppData\Local\Temp\config.ini

              Filesize

              51B

              MD5

              7f3caf47dde94a9684497dfe2aaad46d

              SHA1

              3ad5bc979213d4f95a5585d73f9786f3e9730242

              SHA256

              afcaa0eb594a76bcae5ef45151156d71ff070c198f372f09c3cacc4caffc1d21

              SHA512

              a5a40534a9ca46ae6c9bc5dda1574f6166cce8228ecb88802f91c1105bbde2c7546edf492deff4d3a3836adb5584a2e2f51accdcdd5eea476db3c87ba3d64e7e

            • C:\Users\Admin\AppData\Local\Temp\config.ini

              Filesize

              84B

              MD5

              ed87ed2d66dbbb49f9510dccbefb8e87

              SHA1

              a839b0e28830da2fa1119d6027a1d837c2218566

              SHA256

              cc29c6cac1d821b475723c0f2e625c9b414ceeea49f8c669c380000e73773846

              SHA512

              15d61774597e9a28250bfbcade0fc207019c133284481f44c954203bdbfc918a5fde2e9780be956da1242a64b63257851de75538a2c544461bbad31a839cf902

            • memory/1404-133-0x0000000000400000-0x000000000067C000-memory.dmp

              Filesize

              2.5MB

            • memory/1404-160-0x0000000000400000-0x000000000067C000-memory.dmp

              Filesize

              2.5MB

            • memory/1404-161-0x0000000000400000-0x000000000067C000-memory.dmp

              Filesize

              2.5MB

            • memory/1404-192-0x0000000000400000-0x000000000067C000-memory.dmp

              Filesize

              2.5MB