Analysis

  • max time kernel
    148s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2023 15:12

General

  • Target

    78212e96413a67ff53587ce8852b0d07.exe

  • Size

    64KB

  • MD5

    78212e96413a67ff53587ce8852b0d07

  • SHA1

    d2710596d83869b14dc2d239c889963c7fffef34

  • SHA256

    0de1ae9bea0b9798905968363609217a8897de2a7f2b30dba130e41d6d6693e4

  • SHA512

    b4f53b1eab2a78d095b8e228ab27ab2f00a60c93b98bf17cb84c1ea7afc25e4c2540b349a7c69934be36a7d1bb4b968de06a04f60b2b1230c5142ba59d8910c9

  • SSDEEP

    1536:IMylAuq8J7o3hgx4UhmEGVLjCBKMaNVxd2cZkKnCT2XJs:IMy+pm8eqU0LjDMaHx8cKuq2Zs

Score
7/10

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\78212e96413a67ff53587ce8852b0d07.exe
    "C:\Users\Admin\AppData\Local\Temp\78212e96413a67ff53587ce8852b0d07.exe"
    1⤵
    • Adds Run key to start application
    PID:2128

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2128-0-0x0000000007000000-0x000000000700A000-memory.dmp

    Filesize

    40KB

  • memory/2128-2-0x000000000B000000-0x000000000B007000-memory.dmp

    Filesize

    28KB

  • memory/2128-3-0x000000000B000000-0x000000000B007000-memory.dmp

    Filesize

    28KB