Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04/02/2024, 12:05

General

  • Target

    VirusShare_f229782de07742279b47fa23d3e103af.exe

  • Size

    197KB

  • MD5

    f229782de07742279b47fa23d3e103af

  • SHA1

    48cf73c356fb32be115ad7a17fb11591eb5f5fac

  • SHA256

    fa778d59ceb75649c73408cc43a325640c80c360289cb25174406c70ca857f8c

  • SHA512

    239551bbc384587f13c0682ccfc4584313eaaf427395d15db666f775a076fad2934b684d25a2f0deb1e7694ef0545fd07122bc301d3c04622cfb76befaee8404

  • SSDEEP

    3072:QIcWsZawM0xn3pKCtzQnhpFCUFdeKg7Y3U5HXVa7/hdE2RalCJyCn/RBoutkly:QzzlpKClQhplFdwEoF4MZOXoSB

Score
9/10
upx

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

Processes

  • C:\Users\Admin\AppData\Local\Temp\VirusShare_f229782de07742279b47fa23d3e103af.exe
    "C:\Users\Admin\AppData\Local\Temp\VirusShare_f229782de07742279b47fa23d3e103af.exe"
    1⤵
    • Maps connected drives based on registry
    PID:1740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1740-0-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/1740-1-0x0000000000220000-0x0000000000235000-memory.dmp

    Filesize

    84KB

  • memory/1740-2-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/1740-3-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB