Analysis

  • max time kernel
    144s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 10:24

General

  • Target

    16f6a53a770051a4d21ca2d5da04a478.exe

  • Size

    1.4MB

  • MD5

    16f6a53a770051a4d21ca2d5da04a478

  • SHA1

    acba1f1daaa0dbfdf73a0add26a020e5b7f8efbf

  • SHA256

    05bf51e3e012ce562b74ca3363208f9363652fa2fd6c34e456b7320cb8748a9c

  • SHA512

    749d7592a99994c51fbfab8aafb558343d912aca75c12692eb502c6b4bc20cd5dd3a88c273b62075b0b26529bc608f0d2ed5d58c84d554d25df3bd62689c04e5

  • SSDEEP

    24576:8NBalckrFirk3Kol0U4aGV9kYZLPS/oDodgWvnxz53nEWLp3r3d:8NklckWkZZ4pk8tyVxzpEWd3rt

Score
7/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16f6a53a770051a4d21ca2d5da04a478.exe
    "C:\Users\Admin\AppData\Local\Temp\16f6a53a770051a4d21ca2d5da04a478.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    PID:1448

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1448-0-0x0000000000400000-0x00000000007EB000-memory.dmp

    Filesize

    3.9MB

  • memory/1448-1-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/1448-2-0x0000000003660000-0x0000000003661000-memory.dmp

    Filesize

    4KB

  • memory/1448-3-0x0000000000400000-0x00000000007EB000-memory.dmp

    Filesize

    3.9MB

  • memory/1448-5-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/1448-6-0x0000000003660000-0x0000000003661000-memory.dmp

    Filesize

    4KB