Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    14/11/2023, 14:50

General

  • Target

    0f29750f7ab0a00ce6b0f4c0675a5f27c95f7d85c81b8e39c3fb233aa25dfa66.exe

  • Size

    4.2MB

  • MD5

    3c4b5f0afb679111a3f059405319a137

  • SHA1

    d50cde8a407b43ee610123aa77d6867aaea9fed8

  • SHA256

    0f29750f7ab0a00ce6b0f4c0675a5f27c95f7d85c81b8e39c3fb233aa25dfa66

  • SHA512

    34220fcd5a906fabda6a92cc23aa15f614e98186a7d031c91a5fd69e5365c2ec3faa8bd90b57fafc647b8edc27d6ccc25c8d8857189f94216e500c1f3ade9367

  • SSDEEP

    98304:UomRTpoQB4MBuySrBqf4Y99ca17ZHDjmP38ONYRjS+L:kRBJuygY9KItGPs7RjS+L

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f29750f7ab0a00ce6b0f4c0675a5f27c95f7d85c81b8e39c3fb233aa25dfa66.exe
    "C:\Users\Admin\AppData\Local\Temp\0f29750f7ab0a00ce6b0f4c0675a5f27c95f7d85c81b8e39c3fb233aa25dfa66.exe"
    1⤵
    • Enumerates connected drives
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:1956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1956-0-0x0000000000400000-0x0000000000F24000-memory.dmp

    Filesize

    11.1MB

  • memory/1956-1-0x0000000000400000-0x0000000000F24000-memory.dmp

    Filesize

    11.1MB

  • memory/1956-2-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/1956-3-0x00000000038A0000-0x0000000003957000-memory.dmp

    Filesize

    732KB

  • memory/1956-4-0x0000000000400000-0x0000000000F24000-memory.dmp

    Filesize

    11.1MB

  • memory/1956-5-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/1956-6-0x00000000038A0000-0x0000000003957000-memory.dmp

    Filesize

    732KB