Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 21:10

General

  • Target

    1c8ca2023c3e4afa74448f86d85a825b.exe

  • Size

    48KB

  • MD5

    1c8ca2023c3e4afa74448f86d85a825b

  • SHA1

    c19b3edf8b7d60e28270896dc99400ce54a1f273

  • SHA256

    76e7a7b79e3c7df8fab59d1a65bda07b8bbe0d63386f35815faf2e23fcff0370

  • SHA512

    289501b8f449590767ebb2f9be70360d5e244b1f40b4a404bfbdf9c5230386c2c93ccaebdd046877c2d3e98510f9e95491a174ecfcb6d17e721ca4dbfb2e646e

  • SSDEEP

    768:7WWW7JeC4XCpzWtU4vYOoz7MxdKgrHwiTUlTuXLmYyPu6o+/yw6Vqhm7bZ2xpPaw:CWWFeCNpzWtfQ06gMicTW1yy+/yw6tpk

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c8ca2023c3e4afa74448f86d85a825b.exe
    "C:\Users\Admin\AppData\Local\Temp\1c8ca2023c3e4afa74448f86d85a825b.exe"
    1⤵
    • Checks BIOS information in registry
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    PID:2012

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2012-0-0x0000000000400000-0x0000000000446000-memory.dmp

          Filesize

          280KB

        • memory/2012-1-0x0000000000220000-0x0000000000223000-memory.dmp

          Filesize

          12KB

        • memory/2012-2-0x0000000000400000-0x0000000000446000-memory.dmp

          Filesize

          280KB

        • memory/2012-3-0x00000000020C0000-0x00000000022E0000-memory.dmp

          Filesize

          2.1MB

        • memory/2012-7-0x0000000000380000-0x00000000003EA000-memory.dmp

          Filesize

          424KB

        • memory/2012-6-0x0000000000450000-0x0000000000590000-memory.dmp

          Filesize

          1.2MB

        • memory/2012-8-0x0000000002950000-0x00000000041E4000-memory.dmp

          Filesize

          24.6MB

        • memory/2012-5-0x0000000001DC0000-0x00000000020C0000-memory.dmp

          Filesize

          3.0MB

        • memory/2012-9-0x0000000000400000-0x0000000000446000-memory.dmp

          Filesize

          280KB

        • memory/2012-10-0x00000000022E0000-0x00000000024E0000-memory.dmp

          Filesize

          2.0MB