Analysis

  • max time kernel
    0s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 04:34

General

  • Target

    548cae62ddabc8fef637cc6b391c5b0a.exe

  • Size

    1.2MB

  • MD5

    548cae62ddabc8fef637cc6b391c5b0a

  • SHA1

    dffea4fbdfb63b88a43eb04e3eb6719c6a247d6d

  • SHA256

    3e400d799188ec16a42c1f348ce637d958121b384871020aaa3aaab5830c9528

  • SHA512

    ddfe1d14c498b9de6c7a61d96107cecc833f163a3b13c9ad8ee1d213d49650cbb6abc84a6e96ffc9c64103aab7c5f8e5b480bb9a21970f10017fa2ccc2b8b9f3

  • SSDEEP

    24576:+sAsPQwoGEZROMrjUsk1iDtffJEcOZVoMx1yRmz1iuN0HjaH:9jIwo5ZHQZ1iDt+c+VouumBcjaH

Score
7/10

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • UPX packed file 17 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\548cae62ddabc8fef637cc6b391c5b0a.exe
    "C:\Users\Admin\AppData\Local\Temp\548cae62ddabc8fef637cc6b391c5b0a.exe"
    1⤵
      PID:4032
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        C:\Users\Admin\AppData\Local\Temp\svchost.exe
        2⤵
          PID:3120
        • C:\Users\Admin\AppData\Local\Temp\ONE.exe
          "C:\Users\Admin\AppData\Local\Temp\ONE.exe"
          2⤵
            PID:3864
        • C:\Windows\SysWOW64\bjhyfq.exe
          "C:\Windows\system32\bjhyfq.exe" 7
          1⤵
            PID:5084
          • C:\Windows\SysWOW64\cadui.exe
            "C:\Windows\system32\cadui.exe" 7
            1⤵
              PID:5092

            Network

                  MITRE ATT&CK Matrix

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\ONE.exe

                    Filesize

                    58KB

                    MD5

                    8e4bd31b6634e2ec34fd12426e529138

                    SHA1

                    216ab3db9d1d27c4a3a51935018cf2e836389805

                    SHA256

                    ccb884c767f80001d1e136e103a1123c0d792b79f9c7a4513e96d1e7437502a3

                    SHA512

                    6a733dfcbaddcf577bbaa30ff45e3bec12a05d5cff5d408a235e7ccbcbce01604a70d7a8a5c601f472c5ba40802f90cbc74d3670408588b8faa3fffbcaa97e34

                  • memory/3120-40-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/3120-26-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/3120-22-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/3120-33-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/3120-39-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/3120-43-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/3120-56-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/3120-55-0x0000000000430000-0x00000000004F9000-memory.dmp

                    Filesize

                    804KB

                  • memory/3120-38-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/3864-34-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/3864-14-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/3864-11-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/3864-13-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/3864-12-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/4032-2-0x00000000013B0000-0x00000000013C0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4032-0-0x0000000074B00000-0x00000000750B1000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/4032-37-0x0000000074B00000-0x00000000750B1000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/4032-1-0x0000000074B00000-0x00000000750B1000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/5092-35-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/5092-41-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/5092-29-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB