Analysis

  • max time kernel
    144s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    31/10/2023, 13:52

General

  • Target

    723e3b0d059163c2ed462a8ed90d007791ae212c3cd39fa3c3ece9b997b2d8db.exe

  • Size

    3.8MB

  • MD5

    f95b72c95a21d392a83d6d7ab79bfcd1

  • SHA1

    c73abe26937ec92b8407ddc0afdce36530dd4495

  • SHA256

    723e3b0d059163c2ed462a8ed90d007791ae212c3cd39fa3c3ece9b997b2d8db

  • SHA512

    ae667f986dcbddff5e5123f89374af7439df32cdb41753344f346716ccbf73e548348ba61e66eda641fc7a89cdb7dda451af4f4d7dfb92ef3494329bf989fdf6

  • SSDEEP

    98304:c2zVf1GM0kS7iAGLm63fDjmFj+64xgKjUpqBUnqjC:vn3S7RGq0jmFj+ZxkYSH

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\723e3b0d059163c2ed462a8ed90d007791ae212c3cd39fa3c3ece9b997b2d8db.exe
    "C:\Users\Admin\AppData\Local\Temp\723e3b0d059163c2ed462a8ed90d007791ae212c3cd39fa3c3ece9b997b2d8db.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1656
    • C:\Users\Admin\AppData\Local\Temp\723e3b0d059163c2ed462a8ed90d007791ae212c3cd39fa3c3ece9b997b2d8db.exe
      C:\Users\Admin\AppData\Local\Temp\723e3b0d059163c2ed462a8ed90d007791ae212c3cd39fa3c3ece9b997b2d8db.exe -install
      2⤵
        PID:2960

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1656-0-0x0000000000360000-0x00000000010C1000-memory.dmp

            Filesize

            13.4MB

          • memory/1656-2-0x00000000030F0000-0x0000000003E51000-memory.dmp

            Filesize

            13.4MB

          • memory/1656-1-0x0000000000360000-0x00000000010C1000-memory.dmp

            Filesize

            13.4MB

          • memory/2960-3-0x0000000000360000-0x00000000010C1000-memory.dmp

            Filesize

            13.4MB

          • memory/2960-4-0x0000000000360000-0x00000000010C1000-memory.dmp

            Filesize

            13.4MB

          • memory/2960-8-0x0000000000360000-0x00000000010C1000-memory.dmp

            Filesize

            13.4MB

          • memory/2960-9-0x0000000000360000-0x00000000010C1000-memory.dmp

            Filesize

            13.4MB

          • memory/2960-10-0x0000000000360000-0x00000000010C1000-memory.dmp

            Filesize

            13.4MB

          • memory/2960-15-0x0000000000360000-0x00000000010C1000-memory.dmp

            Filesize

            13.4MB

          • memory/2960-16-0x0000000000360000-0x00000000010C1000-memory.dmp

            Filesize

            13.4MB