Analysis

  • max time kernel
    143s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    31/10/2023, 13:49

General

  • Target

    55ee672243fe75c8d73753b08a2f3ce41b56e8bced8cf5c35af7dbbb82fed484.exe

  • Size

    58.8MB

  • MD5

    4efc01865b7504c7bad168fe17383bac

  • SHA1

    c3bf29db1e27136a0acd6340c2e485917518bd01

  • SHA256

    55ee672243fe75c8d73753b08a2f3ce41b56e8bced8cf5c35af7dbbb82fed484

  • SHA512

    81b7a602433fd78a5852b659b19edcac1d8cbcc15b67279239f1191903fc072dd1fa7f16f9273068e6ba137d1bc97405926b4f9908955caf5d466840d28c02bc

  • SSDEEP

    1572864:Rc5V+ncb0QYc8FiQlEG9Pr9vTZCh+M2bOFzfV4wWoghmt9AY:Pnw0Q58FicEGZtTZ3vOV4wnEmTp

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55ee672243fe75c8d73753b08a2f3ce41b56e8bced8cf5c35af7dbbb82fed484.exe
    "C:\Users\Admin\AppData\Local\Temp\55ee672243fe75c8d73753b08a2f3ce41b56e8bced8cf5c35af7dbbb82fed484.exe"
    1⤵
    • Loads dropped DLL
    PID:2840

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\Dtl7E54.tmp\DtlInstUI.dll

          Filesize

          1.0MB

          MD5

          4e07bb0a66e50e14c44076e54cab1ec4

          SHA1

          3640f36649d6098b7daf7b75e8a284284cc5b618

          SHA256

          7b851351564af1732b7e4168bdf937c3a62f100629887ce9237847737ede8231

          SHA512

          51eb587ce078c6f27b107d6c5ec00987ac3f0b6d76429035bd6260e7c77c98c29d64059daaaa96aa8d7376b0d17e679d76c21166c905df22e2a4f2c432b0b5c2

        • \Users\Admin\AppData\Local\Temp\Dtl7E54.tmp\uninstall.dll

          Filesize

          645KB

          MD5

          780ce8a81239945315c17942fa4ef336

          SHA1

          5bc0c4d7210142f28b790a4bc6dcbbaf5611ae95

          SHA256

          4dfbae2282845722c2ed2779c7042381c4df4a1e02bc67565b8c8d471261906a

          SHA512

          397065e27bee2692c704cdc80a3631b1b52fd513ff843bff87f21d416d05b9135891d6f9b8fd22dbdd5475817915d554b38b31187b55cd59744da9550bd863cd

        • memory/2840-10-0x0000000000E10000-0x0000000001E10000-memory.dmp

          Filesize

          16.0MB