Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 10:53

General

  • Target

    167d49e1cea00e0592525915b4c971a3.exe

  • Size

    86KB

  • MD5

    167d49e1cea00e0592525915b4c971a3

  • SHA1

    12c3f460a901f57caf91653909f57dd34982ae26

  • SHA256

    cabd9821efbc92ae6f8a7fdb274aea761d97921e0454373b81d95943108c51b4

  • SHA512

    43b93e0ed9c72e5925f463afc1dd8b190066d55e79cc511638e2b70ee9445101f5e0c8982ef879694f41d064492e2e1447b148fce7c65f4860ea0431a0221fe7

  • SSDEEP

    1536:Cdd8v/VHsWJ6VhKtYIB5l+8h35UM1Xs3SH685CJYRX6HS8IOR0tD/4tVhOpicoHP:Cdd8v/VHsWJ6rKtYIB5l+8h35UM1Xs3x

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\167d49e1cea00e0592525915b4c971a3.exe
    "C:\Users\Admin\AppData\Local\Temp\167d49e1cea00e0592525915b4c971a3.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1688
    • C:\Windows\SysWOW64\reg.exe
      reg.exe import ntrootkit.reg
      2⤵
        PID:2724

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1688-0-0x0000000000400000-0x0000000000417000-memory.dmp

      Filesize

      92KB

    • memory/1688-1-0x0000000000400000-0x0000000000417000-memory.dmp

      Filesize

      92KB