Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 20:25

General

  • Target

    03082e92dd0de7452ade24f2c2331a37.exe

  • Size

    42KB

  • MD5

    03082e92dd0de7452ade24f2c2331a37

  • SHA1

    7afa271a884c93cce0beed04f1b8d19351b07777

  • SHA256

    b0496f304d4018e9a0ff8f64ee573beb95a2fd07fd683c48fb005ce3cd8be1f1

  • SHA512

    2746fb46ecfe506cb5b0d9f295e500c67b19d73cb849fd2782e17aea7d3978818ad8de6fd97982da22ec03d95424d1773aa918879a8434acbd52d1caae355fc5

  • SSDEEP

    768:8xhflbDkq1FgxE6hg5T6VpLrHnkW4gSu9/oZfJdtCkk6MFlFf:8TfdDkq1Fcvy6VpPEW4gSutoZfJdU6MF

Score
7/10

Malware Config

Signatures

  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03082e92dd0de7452ade24f2c2331a37.exe
    "C:\Users\Admin\AppData\Local\Temp\03082e92dd0de7452ade24f2c2331a37.exe"
    1⤵
    • Adds Run key to start application
    • Modifies WinLogon
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    PID:2204

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2204-0-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2204-4-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2204-6-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2204-8-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2204-10-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2204-12-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2204-14-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2204-16-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2204-17-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB