Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 03:59

General

  • Target

    044b4514abefc50caa8b52168f904f89.exe

  • Size

    694KB

  • MD5

    044b4514abefc50caa8b52168f904f89

  • SHA1

    6b544caf1400ec765f16cb0254a1bd0ea6e25d81

  • SHA256

    e0cdf14e7ed8c69c8319322ad5285f320afab3918dddd3d15660c101767d58c3

  • SHA512

    6d85ce6d81d78820ca310b573195173518a2349287862149d1dba48dcaee31d635c9f3c0b2ab36e2c4f54861726a657672fa9f797cf036f00d0756a6d23f32c0

  • SSDEEP

    12288:Ftug3py1iHhf9zyzt1g9NzdFq69SbJU9sxkcg4:zuEpy1i1+4TzS6SUiZ

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 36
    1⤵
    • Program crash
    PID:1988
  • C:\Users\Admin\AppData\Local\Temp\044b4514abefc50caa8b52168f904f89.exe
    "C:\Users\Admin\AppData\Local\Temp\044b4514abefc50caa8b52168f904f89.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2808

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2808-0-0x0000000000400000-0x00000000006F2000-memory.dmp

          Filesize

          2.9MB