Analysis

  • max time kernel
    0s
  • max time network
    13s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 06:54

General

  • Target

    5ae94a44f940470041406d034a70a88e.exe

  • Size

    1.1MB

  • MD5

    5ae94a44f940470041406d034a70a88e

  • SHA1

    041fa65374fe0312e8c05b0aacb52922db3ebf68

  • SHA256

    069dda54e9ed04b61fab601cd04890915ac043a7cdee959d879a529bfb5d0256

  • SHA512

    7f72923d480cd98a292c32e9765f217df2822bd72e26361f2afdc82dc80f292b72a0dfaa0f3e18d961372f8f46cd6bc6b4c92c4ab705775e07b5fe353070ba3e

  • SSDEEP

    24576:Iq5TfcdHj4fmb02qp0MmV0VMXLG3on1Gx1s4oo5osSx5:IUTsamQxLo1no5oL

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ae94a44f940470041406d034a70a88e.exe
    "C:\Users\Admin\AppData\Local\Temp\5ae94a44f940470041406d034a70a88e.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1908
    • C:\Users\Admin\AppData\Local\Temp\DMR\dmr_72.exe
      "C:\Users\Admin\AppData\Local\Temp\DMR\dmr_72.exe" -install -54422427 -dhtechradar -d7794bb3fa4d4daab18f6ee417dd6e5f - - -bnupcwbhdtxluxer -1908
      2⤵
        PID:3808

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1908-0-0x0000000000160000-0x00000000003D6000-memory.dmp

            Filesize

            2.5MB

          • memory/1908-20-0x0000000000160000-0x00000000003D6000-memory.dmp

            Filesize

            2.5MB

          • memory/3808-13-0x00000000008D0000-0x0000000000932000-memory.dmp

            Filesize

            392KB

          • memory/3808-16-0x00000000012B0000-0x00000000012C0000-memory.dmp

            Filesize

            64KB

          • memory/3808-15-0x00007FF913BB0000-0x00007FF914671000-memory.dmp

            Filesize

            10.8MB

          • memory/3808-18-0x00000000012B0000-0x00000000012C0000-memory.dmp

            Filesize

            64KB

          • memory/3808-17-0x00000000012B0000-0x00000000012C0000-memory.dmp

            Filesize

            64KB

          • memory/3808-19-0x00000000012B0000-0x00000000012C0000-memory.dmp

            Filesize

            64KB

          • memory/3808-22-0x000000001DCD0000-0x000000001E427000-memory.dmp

            Filesize

            7.3MB

          • memory/3808-23-0x00007FF913BB0000-0x00007FF914671000-memory.dmp

            Filesize

            10.8MB