Analysis

  • max time kernel
    139s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 05:28

General

  • Target

    2a0480fe8c52398bb85fb19165d67598.exe

  • Size

    411KB

  • MD5

    2a0480fe8c52398bb85fb19165d67598

  • SHA1

    9acf9ecb00df43c462799e6a73a1cb3723600a60

  • SHA256

    89887d6a5f728886bc9f6012606918246c91ecafe903777f4fcda168217e9a5e

  • SHA512

    3125fe7e15a0c8a584d2d5fa3ad96279d7aa7dc91be1adf4ac547d2953dc829b230c07105218980978311b96d007f5e1abe03b643e07863c35b157937958e99a

  • SSDEEP

    12288:LXe9PPlowWX0t6mOQwg1Qd15CcYk0We1K3N:ShloDX0XOf4E3N

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • AutoIT Executable 4 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a0480fe8c52398bb85fb19165d67598.exe
    "C:\Users\Admin\AppData\Local\Temp\2a0480fe8c52398bb85fb19165d67598.exe"
    1⤵
      PID:352

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/352-0-0x0000000000400000-0x00000000004FF000-memory.dmp

      Filesize

      1020KB

    • memory/352-1-0x0000000000400000-0x00000000004FF000-memory.dmp

      Filesize

      1020KB

    • memory/352-2-0x0000000000400000-0x00000000004FF000-memory.dmp

      Filesize

      1020KB

    • memory/352-3-0x0000000004840000-0x0000000004841000-memory.dmp

      Filesize

      4KB

    • memory/352-10-0x0000000000400000-0x00000000004FF000-memory.dmp

      Filesize

      1020KB

    • memory/352-11-0x0000000000400000-0x00000000004FF000-memory.dmp

      Filesize

      1020KB