Analysis

  • max time kernel
    1s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-12-2023 23:30

General

  • Target

    06f985d32c61c1ef235df8516ff721ce.exe

  • Size

    1.2MB

  • MD5

    06f985d32c61c1ef235df8516ff721ce

  • SHA1

    5eec2a7b37f0c1d35977a1e8056c3c3595cce1fa

  • SHA256

    53a0902ac696cd93d9584d20a18bd430a05b29b3e0d0f235f98ff1422d21d2af

  • SHA512

    f36b03e12c3651ec18e789bf5af75376b0af72a0a47aef97647763f1c8fbf1c6bcd6e977eae6d043833f69ed16393dd16b4b59bca1305466e523bc77b6c955bb

  • SSDEEP

    24576:T0n12NHo+Pf+SJ7U4ujmBGPMsuK9q88Zay9FgJq/X:Tm26Afp7UpruKK/

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06f985d32c61c1ef235df8516ff721ce.exe
    "C:\Users\Admin\AppData\Local\Temp\06f985d32c61c1ef235df8516ff721ce.exe"
    1⤵
      PID:832
      • C:\Users\Admin\AppData\Local\Temp\Crypted.exe
        "C:\Users\Admin\AppData\Local\Temp\Crypted.exe"
        2⤵
          PID:3260
          • C:\Users\Admin\AppData\Local\Temp\Crypted.exe
            "C:\Users\Admin\AppData\Local\Temp\Crypted.exe"
            3⤵
              PID:528
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              3⤵
                PID:4804
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4356 -ip 4356
            1⤵
              PID:2140
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4356 -s 564
              1⤵
              • Program crash
              PID:2156
            • C:\Windows\SysWOW64\install\ophcrack.exe
              "C:\Windows\system32\install\ophcrack.exe"
              1⤵
                PID:4356

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/528-89-0x0000000024080000-0x00000000240E2000-memory.dmp

                Filesize

                392KB

              • memory/528-1403-0x0000000024080000-0x00000000240E2000-memory.dmp

                Filesize

                392KB

              • memory/528-26-0x00000000001E0000-0x00000000001E1000-memory.dmp

                Filesize

                4KB

              • memory/528-27-0x00000000005C0000-0x00000000005C1000-memory.dmp

                Filesize

                4KB

              • memory/528-86-0x0000000003CB0000-0x0000000003CB1000-memory.dmp

                Filesize

                4KB

              • memory/528-87-0x0000000024080000-0x00000000240E2000-memory.dmp

                Filesize

                392KB

              • memory/832-6-0x0000000001090000-0x0000000001098000-memory.dmp

                Filesize

                32KB

              • memory/832-0-0x000000001B4B0000-0x000000001B556000-memory.dmp

                Filesize

                664KB

              • memory/832-8-0x0000000000DA0000-0x0000000000DB0000-memory.dmp

                Filesize

                64KB

              • memory/832-18-0x00007FFEE7460000-0x00007FFEE7E01000-memory.dmp

                Filesize

                9.6MB

              • memory/832-2-0x000000001BA50000-0x000000001BF1E000-memory.dmp

                Filesize

                4.8MB

              • memory/832-3-0x00007FFEE7460000-0x00007FFEE7E01000-memory.dmp

                Filesize

                9.6MB

              • memory/832-1-0x00007FFEE7460000-0x00007FFEE7E01000-memory.dmp

                Filesize

                9.6MB

              • memory/832-7-0x000000001C1B0000-0x000000001C1FC000-memory.dmp

                Filesize

                304KB

              • memory/832-5-0x000000001C050000-0x000000001C0EC000-memory.dmp

                Filesize

                624KB

              • memory/832-4-0x0000000000DA0000-0x0000000000DB0000-memory.dmp

                Filesize

                64KB

              • memory/3260-83-0x0000000024080000-0x00000000240E2000-memory.dmp

                Filesize

                392KB

              • memory/3260-22-0x0000000024010000-0x0000000024072000-memory.dmp

                Filesize

                392KB