Analysis

  • max time kernel
    140s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    04/02/2024, 07:43

General

  • Target

    Box_BD2011_3.1/Box_BD2011.exe

  • Size

    447KB

  • MD5

    3a0987d1483d8762cea593a660cbf743

  • SHA1

    b51c6b2235a6090c53b911274dab2ddcb75e46a6

  • SHA256

    7dba8eef7245428e92bf46613b56d173b6850c6b81e139a1cbaebae821a4cba0

  • SHA512

    ca4fed14866e5f2e2292d96cdedfb701fcaf853114df8ccfdb29b14850714edd5cef852860e8254a61b0b9c70b9f3f5f46dd9120af6ba864ec7bac3b0c79d54a

  • SSDEEP

    12288:c9BvctM85t35JPNJj2WzoRLQYRYzmYtZa+3BRYO3G4tX/:cD0tM85tbNJjldeYiYRxR1lJ

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Box_BD2011_3.1\Box_BD2011.exe
    "C:\Users\Admin\AppData\Local\Temp\Box_BD2011_3.1\Box_BD2011.exe"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2916-0-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2916-8-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB