Analysis

  • max time kernel
    149s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/01/2024, 14:27

General

  • Target

    281fb1d9ff3e0b1b5294c57f1f77b81e56b898a7884803442adb9ffb49ca3025.exe

  • Size

    100KB

  • MD5

    6ecf5ba0d379b0ca1ff2faffeb57bf85

  • SHA1

    ffd5f1983e020cfe406d4de9991aee0039c096fe

  • SHA256

    2cdc17934512cafdf8107c8675d986a69cc6b0cfc10fa4158363ff5f424b8755

  • SHA512

    2fa48bd10a0e609e1698b63dca224e830403d98af59edbc1fc96297129d05d6a2dcbe8c0090dc863722ffd27273d576840ee1755b25a3df1279b19fd05095159

  • SSDEEP

    1536:jTKJtyLNVcBGsTEH1Nj6+UMbO2lq2oDSSBJjRL2pHIcg2/tAHFpfO:iJtyL3EFEHpUD2qfZaXKFh

Score
9/10
upx

Malware Config

Signatures

  • Detects binaries and memory artifacts referencing sandbox product IDs 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\281fb1d9ff3e0b1b5294c57f1f77b81e56b898a7884803442adb9ffb49ca3025.exe
    "C:\Users\Admin\AppData\Local\Temp\281fb1d9ff3e0b1b5294c57f1f77b81e56b898a7884803442adb9ffb49ca3025.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4976
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
      2⤵
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      PID:4548

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4976-1-0x0000000010410000-0x0000000010446000-memory.dmp

          Filesize

          216KB

        • memory/4976-4-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB