Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-02-2024 12:54

General

  • Target

    9bba37990c2133c1956e7b969e967daa.exe

  • Size

    90KB

  • MD5

    9bba37990c2133c1956e7b969e967daa

  • SHA1

    a5f8440f6b0105424fd701848593f4df8c754906

  • SHA256

    cfec8de7264111de89ef6e8653434d26a68667d2f153c1a7c104082dadfe662a

  • SHA512

    c0ffee00aad9aef807436d177252d1ff3407685bfbd72e4bc8d5049806e6ab624bd73d5acc90be667ff6bdc42a1afc550a1576c31290bf5e249f0f8dc200ee8f

  • SSDEEP

    1536:MdGhKh0JHyoVf3hiNncyuownWgjLtHvO+TBvJ030fK+yXWoaBbov:Ma2dognc7ownWgfdG6ZK+8a2v

Score
7/10

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9bba37990c2133c1956e7b969e967daa.exe
    "C:\Users\Admin\AppData\Local\Temp\9bba37990c2133c1956e7b969e967daa.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2616
    • C:\Users\Admin\AppData\Local\Temp\9bba37990c2133c1956e7b969e967daa.exe
      C:\Users\Admin\AppData\Local\Temp\9bba37990c2133c1956e7b969e967daa.exe
      2⤵
      • Adds Run key to start application
      • Modifies Internet Explorer settings
      PID:376

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/376-1-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB

  • memory/376-13545-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB

  • memory/376-21084-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB

  • memory/376-21085-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB

  • memory/376-21086-0x0000000002470000-0x0000000002471000-memory.dmp

    Filesize

    4KB

  • memory/2616-0-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB

  • memory/2616-1004-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB