Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    07/01/2024, 10:28

General

  • Target

    48baeca3ac19699b95564eda25ff5083.exe

  • Size

    7KB

  • MD5

    48baeca3ac19699b95564eda25ff5083

  • SHA1

    2e78f40ffb7ac309d38b4c0254e52415cce3a4c7

  • SHA256

    b35313c1f920b166c024b493b559095b883def143d3df6215a8ec933b4bc7911

  • SHA512

    468d3d0258a4197598a2318059f3845d297e73180ce9e63976d9f91e2827cb3b5b9057c9bd23b4b235b15b7870df64cd9546adcfde23259dd318c0749d69fd29

  • SSDEEP

    192:D9iHZHtqS3uWBj6epwazfRd0FWwHoEJp6/v1kM4Wihd:D9ktb0Mwid0FW83O5biv

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 88
    1⤵
    • Program crash
    PID:2772
  • C:\Users\Admin\AppData\Local\Temp\48baeca3ac19699b95564eda25ff5083.exe
    "C:\Users\Admin\AppData\Local\Temp\48baeca3ac19699b95564eda25ff5083.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2304

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2304-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2304-1-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB