Analysis

  • max time kernel
    121s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2023 12:00

General

  • Target

    4815651a017ac48039d825a607e4c630_JC.exe

  • Size

    81KB

  • MD5

    4815651a017ac48039d825a607e4c630

  • SHA1

    6872c624ac688830341e1f319549b9ab2197446d

  • SHA256

    21721becfafaa207a00b205265016930a6c49f89fda8f670d3dbb9920aed9a2c

  • SHA512

    b6d86523d6de4066809d51f10e0166bad147d787dfdc400d75e4b0a3cc1e689c02b0e2b24e9e222482b297578616a4435b83a7f911634aa91f5ed453a509d9d1

  • SSDEEP

    1536:5lrsicagdzn8K2ariPOcjk+XQuPVN72NMSVU2QOL0uV4g7lrgS:5JjcF8KfCOcjk+guPVjSV6OL0ud

Score
7/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4815651a017ac48039d825a607e4c630_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\4815651a017ac48039d825a607e4c630_JC.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    PID:1312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\macromd\msncracker.exe

    Filesize

    81KB

    MD5

    5c2fdbd26b3d6c115d72936682bde5f4

    SHA1

    5337e67de7c21376d8538ee4c7d597a45388bda0

    SHA256

    ec8f606e43c7d07102f39fba54c4912cba2658a30b1d0dacba1c5bf32fe1f709

    SHA512

    099f19e44029d4c08a4ca4bca510becaac501393b190b2f0b790e1edc790f550fa0a104660e7cf1a03ad3fb13b771be101efadab1eda8a3cb9b132a97f6e1307

  • memory/1312-0-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/1312-34-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB