Analysis

  • max time kernel
    141s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 08:28

General

  • Target

    136c23cf844ccc43fadd7a65bab49360.exe

  • Size

    59KB

  • MD5

    136c23cf844ccc43fadd7a65bab49360

  • SHA1

    008e20318f84ef7fb2e27cc4939172a832f8dfc9

  • SHA256

    7fb5923a2c23a10b4ac71e6ff7cb8d650ae34a287377f0803ef1a92a95c58139

  • SHA512

    12a4289c9d707926f1942ebededb00c97622c19c3c4267882ca8ac20f77a866341e84267e6d483d041e5ecb2ad792e57497686a9c807f07950447c34dbef2020

  • SSDEEP

    1536:3sJzbdoXXtY9PT8AdzAqSmj5a2KgbYYG:3GzQirPAqSx2w

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

Processes

  • C:\Users\Admin\AppData\Local\Temp\136c23cf844ccc43fadd7a65bab49360.exe
    "C:\Users\Admin\AppData\Local\Temp\136c23cf844ccc43fadd7a65bab49360.exe"
    1⤵
    • Checks processor information in registry
    PID:2156

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2156-0-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/2156-3-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/2156-7-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/2156-13-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/2156-15-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB