Analysis

  • max time kernel
    161s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-11-2023 14:48

General

  • Target

    Serv-U/ServUDaemon.exe

  • Size

    299KB

  • MD5

    f915567a70c18f2124d7825d691ed2ef

  • SHA1

    d0edca33cea8be02fd874389d637ab23fc05010a

  • SHA256

    18b6bec83992cc62d97ea016a3a3aa56a690fc3314a70da095678919140ea0bf

  • SHA512

    32f6123b3f372f49015b0de93c1be0e16b6de65f597652d5cfda092c333aac7f025ea5f70c008c1cb85304c385269e0f9dbbde22881ebe1d8630047a462fec23

  • SSDEEP

    6144:T00L77e1r3+YrxZJWVGTp5Ohoq5P/W8XaMPlmwGlBndJrfnSx6dGUJX:TxL7+TdWUpCoq5nHXAplBdBJT

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 12 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Serv-U\ServUDaemon.exe
    "C:\Users\Admin\AppData\Local\Temp\Serv-U\ServUDaemon.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Serv-U\ServUDaemon.ini

    Filesize

    43B

    MD5

    11a69e661526d74ee8aa43b01888d5db

    SHA1

    5017b35336b018a79efa9a5e6f1666ce7c3e1615

    SHA256

    ba69a65077412c880cde06c584ab1800dd70ad1b856fac4a9b74e44aa63c533d

    SHA512

    dfebbf4e044a084a909a511621bc742d7ac30f3a3332694a3a530c0dfa0603362babcfcc6fc591a96f74a99649a3808fd20050d53c81b3068c89608df421870a

  • memory/4936-57-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/4936-60-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/4936-43-0x0000000002DF0000-0x0000000002EEA000-memory.dmp

    Filesize

    1000KB

  • memory/4936-44-0x0000000002EF0000-0x0000000002F20000-memory.dmp

    Filesize

    192KB

  • memory/4936-49-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/4936-50-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/4936-1-0x0000000000A70000-0x0000000000A83000-memory.dmp

    Filesize

    76KB

  • memory/4936-0-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/4936-53-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/4936-64-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/4936-73-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/4936-76-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/4936-80-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/4936-83-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/4936-94-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB