Analysis

  • max time kernel
    0s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2023 07:48

General

  • Target

    128eec3cbeccc5c6838ac2d95c82a73a.exe

  • Size

    951KB

  • MD5

    128eec3cbeccc5c6838ac2d95c82a73a

  • SHA1

    a58733c9dc96abb6a63c619cfd2cab3e9a193bf1

  • SHA256

    35c0e1b47d5208583c64aeacfbaf515c7df8e325b8c4d98309b4dd067a586d41

  • SHA512

    fda7c3d1b9a64e3d5f4893982d761213a0d4c1fc593f0f810102f19f21f7d9155613a463cc8327180223ebbfeac6bdd44cef5c5a55bb3406dd4c925a5fea0de3

  • SSDEEP

    24576:iKyQdvf6sPekIJbUYNVxNpnKiQhEk5UEIqT3mz1ilI9:DLd6oorpUr5UnC3mh9

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\128eec3cbeccc5c6838ac2d95c82a73a.exe
    "C:\Users\Admin\AppData\Local\Temp\128eec3cbeccc5c6838ac2d95c82a73a.exe"
    1⤵
    • Modifies registry class
    PID:5688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5688-0-0x0000000000400000-0x00000000006EB000-memory.dmp

    Filesize

    2.9MB

  • memory/5688-1-0x0000000002630000-0x0000000002631000-memory.dmp

    Filesize

    4KB

  • memory/5688-2-0x0000000000400000-0x00000000006EB000-memory.dmp

    Filesize

    2.9MB

  • memory/5688-4-0x0000000002630000-0x0000000002631000-memory.dmp

    Filesize

    4KB