Analysis

  • max time kernel
    126s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 03:29

General

  • Target

    266aedca0746a9606080c1b35371bc0e.exe

  • Size

    14KB

  • MD5

    266aedca0746a9606080c1b35371bc0e

  • SHA1

    386b838975dee3a385747b8b9def7ffaf3818c35

  • SHA256

    86211d3380f3c57727fbd0598b519e73bca251977cb4730188d282bf57f2b8dd

  • SHA512

    a311d92d7159cc6b0689bffcd5bc75dc061980225fd145ccb71e063ed610a3779b17034d8cf03311f4f47d297ef3711ec3191613b9141a442a1b87a95f150228

  • SSDEEP

    384:/PJkTWwGy1PZsxPCStZx42ymDJ8QZ+2P6vGDB:/P1wt1PZsxHZhymun

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\266aedca0746a9606080c1b35371bc0e.exe
    "C:\Users\Admin\AppData\Local\Temp\266aedca0746a9606080c1b35371bc0e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c cmd.exe /c echo olha > C:\Users\Admin\AppData\Local\Temp\blomaisatualmentee.txt
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1916
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c cmd.exe /c ren C:\Windows\System32\letsplay1 msnmsgsr.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1960
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c ren C:\Windows\System32\letsplay1 msnmsgsr.exe
        3⤵
          PID:384
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c cmd.exe /c ren C:\Windows\System32\letsplay2 jumperr.exe
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:308
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c start C:\Windows\System32\jumperr.exe /nogui C:\systemX86.txt
        2⤵
          PID:1080
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c start C:\Windows\System32\msnmsgsr.exe
          2⤵
            PID:2132
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v MsnMsgr /t REG_SZ /d "C:\Windows\system32\msnmsgsr.exe"
            2⤵
              PID:1096
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /c echo olha
            1⤵
              PID:2372
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /c ren C:\Windows\System32\letsplay2 jumperr.exe
              1⤵
                PID:1784
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v MsnMsgr /t REG_SZ /d "C:\Windows\system32\msnmsgsr.exe"
                1⤵
                  PID:2840

                Network

                      MITRE ATT&CK Matrix

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • memory/1080-19-0x0000000000230000-0x0000000000231000-memory.dmp

                        Filesize

                        4KB

                      • memory/2132-33-0x00000000006A0000-0x00000000006A1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2980-0-0x0000000000400000-0x0000000000418000-memory.dmp

                        Filesize

                        96KB

                      • memory/2980-2-0x0000000000400000-0x0000000000418000-memory.dmp

                        Filesize

                        96KB

                      • memory/2980-24-0x0000000000400000-0x0000000000418000-memory.dmp

                        Filesize

                        96KB