Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 11:18

General

  • Target

    1a36384c8a29ea9669028c60f134f792.exe

  • Size

    94KB

  • MD5

    1a36384c8a29ea9669028c60f134f792

  • SHA1

    7540f8442e479435041f56565b1721c785797214

  • SHA256

    d0024d1ae859a4b72fc9e085293afc821d4d7010e0b576174187220a13fe6c35

  • SHA512

    f5ab0010d0e117bce7fef27c93c786dd4671a7ca2ae82585405473859e8b5e84752a8bc5fbb075ee5a887c9efc0a94c71cc991f431e336ecd5ed4dfff67538d5

  • SSDEEP

    1536:sklChBhyxcwNhpMwQJBlkUmrXIqmUaVzLAbrOIbvhZ4KSUOcHM:smChPyxcwNhwBmTITNLAbrOIbJZ4DcH

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a36384c8a29ea9669028c60f134f792.exe
    "C:\Users\Admin\AppData\Local\Temp\1a36384c8a29ea9669028c60f134f792.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\a..bat" > nul 2> nul
      2⤵
      • Deletes itself
      PID:2796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\a..bat

    Filesize

    210B

    MD5

    391432fe52bae39fda5c7632062a69b5

    SHA1

    1b72ac2146200257fe0e0907ed7d753a3144712a

    SHA256

    01672904f5a92a2e72e75e77eb9a9bef4aae174778742c8279463d79c182af0d

    SHA512

    31d59fda8493ff2956b0d6b7dc2a2223a3bf59d8a8a78ec58a267a045b3992de84acc174b2dafe5cde85afbbbd24491ec7e4e105bc2defc94ff22a1a5df7177f

  • memory/3024-0-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB

  • memory/3024-2-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB