Analysis

  • max time kernel
    148s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 15:35

General

  • Target

    795773c09813a3e0159aabee6a2de283.exe

  • Size

    87KB

  • MD5

    795773c09813a3e0159aabee6a2de283

  • SHA1

    6e3b1e9bc5c6a99417481276904e869ce3d3fbef

  • SHA256

    98c613376e9087dac1e96e307881611c2dda0ae2d85246ca8393e5370ef3f745

  • SHA512

    912248fe8800b0031c977561486b4a61e39fbd00cd4100b8a02c161cc9ea36b60d53c8023a4c0a503962dac960760aadea59883ba9896fe2d4b1d264eb582373

  • SSDEEP

    384:Il94MDefu8RDaDlwv12zAv3XQ5CgZSf9P25gkOYBSsmnlPnz:Il94MW+Duv12zeOCgZm9YdknVz

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\795773c09813a3e0159aabee6a2de283.exe
    "C:\Users\Admin\AppData\Local\Temp\795773c09813a3e0159aabee6a2de283.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    PID:4668

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\exsplorer.lnk

          Filesize

          218B

          MD5

          dbad00855b4898461d15cfc0e8caedbf

          SHA1

          33e71bfe76407c3c8b27215cf7d3ce3c660ffe09

          SHA256

          8fd134f97cac2b6ca2d562004221bee99a11b2b58320f39c4628b1ff0cdeeffa

          SHA512

          582aceb9ee8646564297a7ea66ecb05f6e33b0cd6bbe9a0ac872a221c244c83a9f3bb12d74f07655343815533296707db9c5436684af960b63122ea18985941e

        • memory/4668-0-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/4668-13-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB