Analysis

  • max time kernel
    0s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 09:37

General

  • Target

    644b7052ac627b2cf6f3d265bce06a85.exe

  • Size

    420KB

  • MD5

    644b7052ac627b2cf6f3d265bce06a85

  • SHA1

    d57c70609ec85c58b522f2b843713772040406c1

  • SHA256

    774404112cf4d8ddf43d07d7f84ce24601d9ec66c31461c7387bce5b5de214b6

  • SHA512

    7d97e7aa14e5c51e13a226d4010c8b082b3fcb9679785b19592552b5865e6566c54ea190344c0f11c1eedef8c51fbca3f5f6d4a717262529b74ddfcb5d0c12c8

  • SSDEEP

    12288:2waA3t7VPRw+8cOSQN2jyGFyFjISvfsJJa/oSdb:Jpbw+8cze/jL4U7b

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\644b7052ac627b2cf6f3d265bce06a85.exe
    "C:\Users\Admin\AppData\Local\Temp\644b7052ac627b2cf6f3d265bce06a85.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:3052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\CabF2F.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Roaming\GetRightToGo\644b7052ac627b2cf6f3d265bce06a85.data

    Filesize

    809B

    MD5

    3211cd648f2c9fc81ab69e670f08cca8

    SHA1

    cd260acaef30dc7ebc695ef48e7f30832908c427

    SHA256

    751dbe151b042088673b4bdeb340073ac0c7e427d2e695aaf73f6200d79837e8

    SHA512

    379432ecc6fa63af07294769dfb37f0bb9250e60663fc77eedee26a67e03f060a9d722580b06ad7a8d48724f744c6b9fd5f9fa8cb58b0d8fa476c835e2bc6e9c

  • C:\Users\Admin\AppData\Roaming\GetRightToGo\644b7052ac627b2cf6f3d265bce06a85.htm

    Filesize

    87KB

    MD5

    2290e78ddaffaa73838e9a67d679cbc7

    SHA1

    5e2583a2c5bad107c82cab2a495d559e1385ae41

    SHA256

    ca6005b88259d61bfc9943b1236cd4f6f12833f3134a3c1553545247d95aca2d

    SHA512

    a2c6ae503b264e30925c685efb6389175138fb809989d5e4c61e62345662c0d7a6e0de57c6a8f883209c7bf613c6be3fb4ca2031876d562271c8b111ad338abc

  • memory/3052-0-0x0000000000400000-0x0000000000602000-memory.dmp

    Filesize

    2.0MB

  • memory/3052-189-0x0000000000400000-0x0000000000602000-memory.dmp

    Filesize

    2.0MB